DEF CON 26 Conference - The Dark Tangent - DEF CON 26 Closing Ceremonies.mp4 357MB
DEF CON 26 Conference - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask.mp4 249MB
DEF CON 26 Conference - Panel - DC 101 PANEL.mp4 187MB
DEF CON 26 Conference - The Dark Tangent and Panel - Panel DEF CON GROUPS.mp4 173MB
DEF CON 26 Conference - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession.mp4 172MB
DEF CON 26 Conference - Nirenberg and Buchwald - Reverse Engineering hacking documentary series.mp4 164MB
DEF CON 26 Conference - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk.mp4 158MB
DEF CON 26 Conference - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills.mp4 149MB
DEF CON 26 Conference - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs.mp4 141MB
DEF CON 26 Conference - Levison and hon1nbo - Booby Trapping Boxes.mp4 140MB
DEF CON 26 Conference - Ossmann and Spill - Revolting Radios.mp4 140MB
DEF CON 26 Conference - Sean Metcalf - Exploiting Active Directory Administrator Insecurities.mp4 133MB
DEF CON 26 Conference - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals.mp4 127MB
DEF CON 26 Conference - Rob Joyce - NSA Talks Cybersecurity.mp4 126MB
DEF CON 26 Conference - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework.mp4 120MB
DEF CON 26 Conference - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs.mp4 113MB
DEF CON 26 Conference - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010.mp4 112MB
DEF CON 26 Conference - Matt Wixey - Betrayed by the keyboard How what you type can give you away.mp4 111MB
DEF CON 26 Conference - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks.mp4 108MB
DEF CON 26 Conference - Joe Grand - Searching for the Light Adventures with OpticSpy.mp4 107MB
DEF CON 26 Conference - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries.mp4 107MB
DEF CON 26 Conference - William Martin - SMBetray Backdooring and breaking signatures.mp4 105MB
DEF CON 26 Conference - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts.mp4 104MB
DEF CON 26 Conference - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability.mp4 101MB
DEF CON 26 Conference - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems.mp4 100MB
DEF CON 26 Conference - Delta Zero and Azeem Aqil - Your Voice is My Passport.mp4 99MB
DEF CON 26 Conference - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices.mp4 96MB
DEF CON 26 Conference - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.mp4 91MB
DEF CON 26 Conference - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine.mp4 89MB
DEF CON 26 Conference - sghctoma - All Your Math are Belong to Us.mp4 89MB
DEF CON 26 Conference - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult.mp4 87MB
DEF CON 26 Conference - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill.mp4 81MB
DEF CON 26 Conference - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator.mp4 80MB
DEF CON 26 Conference - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain.mp4 79MB
DEF CON 26 Conference - yawnbox - Privacy Infrastructure Challenges and Opportunities.mp4 76MB
DEF CON 26 Conference - Shkatov and Michael - UEFI Exploitation for the Masses.mp4 74MB
DEF CON 26 Conference - Rob Joyce - Building Absurd Christmas Light Shows.mp4 73MB
DEF CON 26 Conference - HuiYu and Qian - Breaking Smart Speakers We are Listening to You.mp4 70MB
DEF CON 26 Conference - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System.mp4 70MB
DEF CON 26 Conference - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems.mp4 69MB
DEF CON 26 Conference - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps.mp4 68MB
DEF CON 26 Conference - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware.mp4 68MB
DEF CON 26 Conference - Eyal Itkin, Yaniv Balmas - What the Fax-!.mp4 67MB
DEF CON 26 Conference - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries.mp4 67MB
DEF CON 26 Conference - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug.mp4 65MB
DEF CON 26 Conference - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras.mp4 63MB
DEF CON 26 Conference - singe - Practical and Improved Wifi MitM with Mana.mp4 62MB
DEF CON 26 Conference - Champion and Law - Building the Hacker Tracker.mp4 61MB
DEF CON 26 Conference - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities.mp4 60MB
DEF CON 26 Conference - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You.mp4 60MB
DEF CON 26 Conference - Egypt and Vu - One-liners to Rule Them All.mp4 59MB
DEF CON 26 Conference - Steven Danneman - Your Banks Digital Side Door.mp4 58MB
DEF CON 26 Conference - Ian Haken - Automated Discovery of Deserialization Gadget Chains.mp4 58MB
DEF CON 26 Conference - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit.mp4 58MB
DEF CON 26 Conference - Nafeez - Compression Oracle Attacks on VPN Networks.mp4 58MB
DEF CON 26 Conference - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers.mp4 57MB
DEF CON 26 Conference - Patrick Wardle - The Mouse is Mightier than the Sword.mp4 56MB
DEF CON 26 Conference - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones.mp4 56MB
DEF CON 26 Conference - Daniel Crowley and Panel - Outsmarting the Smart City.mp4 56MB
DEF CON 26 Conference - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures.mp4 55MB
DEF CON 26 Conference - smea - Jailbreaking the 3DS through 7 years of hardening.mp4 55MB
DEF CON 26 Conference - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out.mp4 54MB
DEF CON 26 Conference - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband.mp4 54MB
DEF CON 26 Conference - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more.mp4 53MB
DEF CON 26 Conference - Christopher Domas - The ring 0 facade awakening the processors inner demons.mp4 53MB
DEF CON 26 Conference - Alguacil and Murillo Moya - Playback a TLS 1 point 3 story.mp4 50MB
DEF CON 26 Conference - Yu Wang - Attacking the macOS Kernel Graphics Driver.mp4 50MB
DEF CON 26 Conference - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits.mp4 50MB
DEF CON 26 Conference - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices.mp4 50MB
DEF CON 26 Conference - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch.mp4 49MB
DEF CON 26 Conference - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data.mp4 49MB
DEF CON 26 Conference - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications.mp4 48MB
DEF CON 26 Conference - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts.mp4 48MB
DEF CON 26 Conference - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home.mp4 48MB
DEF CON 26 Conference - Zeng and Panel - Lora Smart Water Meter Security Analysis.mp4 46MB
DEF CON 26 Conference - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains.mp4 45MB
DEF CON 26 Conference - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading.mp4 44MB
DEF CON 26 Conference - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems.mp4 44MB
DEF CON 26 Conference - Slava Makkaveev - Man-In-The-Disk.mp4 42MB
DEF CON 26 Conference - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems.mp4 42MB
DEF CON 26 Conference - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray.mp4 42MB
DEF CON 26 Conference - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear.mp4 41MB
DEF CON 26 Conference - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses.mp4 41MB
DEF CON 26 Conference - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication.mp4 40MB
DEF CON 26 Conference - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit.mp4 39MB
DEF CON 26 Conference - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts.mp4 39MB
DEF CON 26 Conference - Maggie Mayhem - Sex Work After SESTA FOSTA.mp4 37MB
DEF CON 26 Conference - William Martin - One-Click to OWA.mp4 36MB
DEF CON 26 Conference - West and Campbell - barcOwned Popping shells with your cereal box.mp4 36MB
DEF CON 26 Conference - Matt King - Micro-Renovator Bringing Processor Firmware up to Code.mp4 36MB
DEF CON 26 Conference - Truman Kain - Dragnet Your Social Engineering Sidekick.mp4 35MB
DEF CON 26 Conference - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly.mp4 32MB
DEF CON 26 Conference - 0x200b - Detecting Blue Team Research Through Targeted Ads.mp4 31MB
DEF CON 26 Conference - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems.mp4 30MB
DEF CON 26 Conference - Zach and Alex - Infecting The Embedded Supply Chain.mp4 29MB
DEF CON 26 Conference - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller.mp4 29MB
DEF CON 26 Conference - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers.mp4 29MB
DEF CON 26 Conference - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox.mp4 27MB
DEF CON 26 Conference - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era.mp4 25MB
DEF CON 26 Conference - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls.mp4 25MB
DEF CON 26 Conference - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones.mp4 24MB
DEF CON 26 Conference - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries.mp4 22MB
DEF CON 26 Conference - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program.mp4 22MB
DEF CON 26 Conference - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking.mp4 21MB
DEF CON 26 Conference - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators.mp4 21MB
DEF CON 26 Conference - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask.srt 94KB
DEF CON 26 Conference - The Dark Tangent - DEF CON 26 Closing Ceremonies.srt 91KB
DEF CON 26 Conference - Dr Cindy Poppins AKA Svea Eckert and Panel - Inside the Fake Science Factory.srt 86KB
DEF CON 26 Conference - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems.srt 69KB
DEF CON 26 Conference - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator.srt 69KB
DEF CON 26 Conference - Joe Grand - Searching for the Light Adventures with OpticSpy.srt 69KB
DEF CON 26 Conference - smea - Jailbreaking the 3DS through 7 years of hardening.srt 67KB
DEF CON 26 Conference - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals.srt 66KB
DEF CON 26 Conference - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs.srt 66KB
DEF CON 26 Conference - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills.srt 64KB
DEF CON 26 Conference - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010.srt 64KB
DEF CON 26 Conference - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine.srt 62KB
DEF CON 26 Conference - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband.srt 62KB
DEF CON 26 Conference - Sean Metcalf - Exploiting Active Directory Administrator Insecurities.srt 61KB
DEF CON 26 Conference - Ian Haken - Automated Discovery of Deserialization Gadget Chains.srt 59KB
DEF CON 26 Conference - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs.srt 58KB
DEF CON 26 Conference - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits.srt 58KB
DEF CON 26 Conference - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices.srt 56KB
DEF CON 26 Conference - The Dark Tangent and Panel - Panel DEF CON GROUPS.srt 56KB
DEF CON 26 Conference - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System.srt 56KB
DEF CON 26 Conference - Patrick Wardle - The Mouse is Mightier than the Sword.srt 56KB
DEF CON 26 Conference - Nirenberg and Buchwald - Reverse Engineering hacking documentary series.srt 56KB
DEF CON 26 Conference - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities.srt 55KB
DEF CON 26 Conference - Ossmann and Spill - Revolting Radios.srt 55KB
DEF CON 26 Conference - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home.srt 54KB
DEF CON 26 Conference - Panel - DC 101 PANEL.srt 54KB
DEF CON 26 Conference - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession.srt 53KB
DEF CON 26 Conference - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain.srt 53KB
DEF CON 26 Conference - Rob Joyce - NSA Talks Cybersecurity.srt 52KB
DEF CON 26 Conference - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries.srt 51KB
DEF CON 26 Conference - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications.srt 51KB
DEF CON 26 Conference - Matt Wixey - Betrayed by the keyboard How what you type can give you away.srt 51KB
DEF CON 26 Conference - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries.srt 51KB
DEF CON 26 Conference - Steven Danneman - Your Banks Digital Side Door.srt 51KB
DEF CON 26 Conference - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult.srt 50KB
DEF CON 26 Conference - Balmas and Itkin - What the Fax.srt 50KB
DEF CON 26 Conference - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.srt 50KB
DEF CON 26 Conference - singe - Practical and Improved Wifi MitM with Mana.srt 50KB
DEF CON 26 Conference - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework.srt 49KB
DEF CON 26 Conference - Levison and hon1nbo - Booby Trapping Boxes.srt 48KB
DEF CON 26 Conference - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more.srt 48KB
DEF CON 26 Conference - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps.srt 47KB
DEF CON 26 Conference - Shkatov and Michael - UEFI Exploitation for the Masses.srt 47KB
DEF CON 26 Conference - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk.srt 46KB
DEF CON 26 Conference - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices.srt 46KB
DEF CON 26 Conference - Nafeez - Compression Oracle Attacks on VPN Networks.srt 46KB
DEF CON 26 Conference - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras.srt 46KB
DEF CON 26 Conference - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill.srt 44KB
DEF CON 26 Conference - William Martin - SMBetray Backdooring and breaking signatures.srt 44KB
DEF CON 26 Conference - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems.srt 44KB
DEF CON 26 Conference - Egypt and Vu - One-liners to Rule Them All.srt 44KB
DEF CON 26 Conference - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit.srt 43KB
DEF CON 26 Conference - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems.srt 42KB
DEF CON 26 Conference - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures.srt 41KB
DEF CON 26 Conference - Rob Joyce - Building Absurd Christmas Light Shows.srt 41KB
DEF CON 26 Conference - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts.srt 40KB
DEF CON 26 Conference - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication.srt 40KB
DEF CON 26 Conference - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability.srt 39KB
DEF CON 26 Conference - Delta Zero and Azeem Aqil - Your Voice is My Passport.srt 39KB
DEF CON 26 Conference - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers.srt 39KB
DEF CON 26 Conference - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out.srt 38KB
DEF CON 26 Conference - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks.srt 38KB
DEF CON 26 Conference - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware.srt 37KB
DEF CON 26 Conference - HuiYu and Qian - Breaking Smart Speakers We are Listening to You.srt 37KB
DEF CON 26 Conference - Daniel Crowley and Panel - Outsmarting the Smart City.srt 36KB
DEF CON 26 Conference - yawnbox - Privacy Infrastructure Challenges and Opportunities.srt 36KB
DEF CON 26 Conference - Champion and Law - Building the Hacker Tracker.srt 35KB
DEF CON 26 Conference - Alguacil and Murillo Moya - Playback a TLS 1 point 3 story.srt 33KB
DEF CON 26 Conference - sghctoma - All Your Math are Belong to Us.srt 33KB
DEF CON 26 Conference - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch.srt 32KB
DEF CON 26 Conference - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug.srt 32KB
DEF CON 26 Conference - Christopher Domas - The ring 0 facade awakening the processors inner demons.srt 31KB
DEF CON 26 Conference - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains.srt 31KB
DEF CON 26 Conference - 0x200b - Detecting Blue Team Research Through Targeted Ads.srt 28KB
DEF CON 26 Conference - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit.srt 28KB
DEF CON 26 Conference - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems.srt 27KB
DEF CON 26 Conference - Yu Wang - Attacking the macOS Kernel Graphics Driver.srt 27KB
DEF CON 26 Conference - Zach and Alex - Infecting The Embedded Supply Chain.srt 26KB
DEF CON 26 Conference - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls.srt 26KB
DEF CON 26 Conference - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems.srt 26KB
DEF CON 26 Conference - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones.srt 26KB
DEF CON 26 Conference - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking.srt 25KB
DEF CON 26 Conference - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts.srt 25KB
DEF CON 26 Conference - William Martin - One-Click to OWA.srt 25KB
DEF CON 26 Conference - Maggie Mayhem - Sex Work After SESTA FOSTA.srt 25KB
DEF CON 26 Conference - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly.srt 24KB
DEF CON 26 Conference - West and Campbell - barcOwned Popping shells with your cereal box.srt 23KB
DEF CON 26 Conference - Truman Kain - Dragnet Your Social Engineering Sidekick.srt 23KB
DEF CON 26 Conference - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses.srt 23KB
DEF CON 26 Conference - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray.srt 21KB
DEF CON 26 Conference - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You.srt 21KB
DEF CON 26 Conference - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear.srt 21KB
DEF CON 26 Conference - Zeng and Panel - Lora Smart Water Meter Security Analysis.srt 21KB
DEF CON 26 Conference - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers.srt 21KB
DEF CON 26 Conference - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era.srt 20KB
DEF CON 26 Conference - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries.srt 20KB
DEF CON 26 Conference - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones.srt 20KB
DEF CON 26 Conference - Matt King - Micro-Renovator Bringing Processor Firmware up to Code.srt 20KB
DEF CON 26 Conference - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data.srt 19KB
DEF CON 26 Conference - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller.srt 17KB
DEF CON 26 Conference - Slava Makkaveev - Man-In-The-Disk.srt 17KB
DEF CON 26 Conference - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox.srt 17KB
DEF CON 26 Conference - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program.srt 16KB
DEF CON 26 Conference - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts.srt 16KB
DEF CON 26 Conference - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading.srt 15KB
DEF CON 26 Conference - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators.srt 14KB