589689.xyz

DEF CON 26 video and slides

  • 收录时间:2019-04-06 09:06:11
  • 文件大小:8GB
  • 下载次数:121
  • 最近下载:2021-01-14 17:49:08
  • 磁力链接:

文件列表

  1. DEF CON 26 Conference - The Dark Tangent - DEF CON 26 Closing Ceremonies.mp4 357MB
  2. DEF CON 26 Conference - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask.mp4 249MB
  3. DEF CON 26 Conference - Panel - DC 101 PANEL.mp4 187MB
  4. DEF CON 26 Conference - The Dark Tangent and Panel - Panel DEF CON GROUPS.mp4 173MB
  5. DEF CON 26 Conference - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession.mp4 172MB
  6. DEF CON 26 Conference - Nirenberg and Buchwald - Reverse Engineering hacking documentary series.mp4 164MB
  7. DEF CON 26 Conference - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk.mp4 158MB
  8. DEF CON 26 Conference - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills.mp4 149MB
  9. DEF CON 26 Conference - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs.mp4 141MB
  10. DEF CON 26 Conference - Levison and hon1nbo - Booby Trapping Boxes.mp4 140MB
  11. DEF CON 26 Conference - Ossmann and Spill - Revolting Radios.mp4 140MB
  12. DEF CON 26 Conference - Sean Metcalf - Exploiting Active Directory Administrator Insecurities.mp4 133MB
  13. DEF CON 26 Conference - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals.mp4 127MB
  14. DEF CON 26 Conference - Rob Joyce - NSA Talks Cybersecurity.mp4 126MB
  15. DEF CON 26 Conference - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework.mp4 120MB
  16. DEF CON 26 Conference - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs.mp4 113MB
  17. DEF CON 26 Conference - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010.mp4 112MB
  18. DEF CON 26 Conference - Matt Wixey - Betrayed by the keyboard How what you type can give you away.mp4 111MB
  19. DEF CON 26 Conference - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks.mp4 108MB
  20. DEF CON 26 Conference - Joe Grand - Searching for the Light Adventures with OpticSpy.mp4 107MB
  21. DEF CON 26 Conference - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries.mp4 107MB
  22. DEF CON 26 Conference - William Martin - SMBetray Backdooring and breaking signatures.mp4 105MB
  23. DEF CON 26 Conference - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts.mp4 104MB
  24. DEF CON 26 Conference - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability.mp4 101MB
  25. DEF CON 26 Conference - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems.mp4 100MB
  26. DEF CON 26 Conference - Delta Zero and Azeem Aqil - Your Voice is My Passport.mp4 99MB
  27. DEF CON 26 Conference - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices.mp4 96MB
  28. DEF CON 26 Conference - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.mp4 91MB
  29. DEF CON 26 Conference - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine.mp4 89MB
  30. DEF CON 26 Conference - sghctoma - All Your Math are Belong to Us.mp4 89MB
  31. DEF CON 26 Conference - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult.mp4 87MB
  32. DEF CON 26 Conference - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill.mp4 81MB
  33. DEF CON 26 Conference - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator.mp4 80MB
  34. DEF CON 26 Conference - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain.mp4 79MB
  35. DEF CON 26 Conference - yawnbox - Privacy Infrastructure Challenges and Opportunities.mp4 76MB
  36. DEF CON 26 Conference - Shkatov and Michael - UEFI Exploitation for the Masses.mp4 74MB
  37. DEF CON 26 Conference - Rob Joyce - Building Absurd Christmas Light Shows.mp4 73MB
  38. DEF CON 26 Conference - HuiYu and Qian - Breaking Smart Speakers We are Listening to You.mp4 70MB
  39. DEF CON 26 Conference - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System.mp4 70MB
  40. DEF CON 26 Conference - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems.mp4 69MB
  41. DEF CON 26 Conference - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps.mp4 68MB
  42. DEF CON 26 Conference - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware.mp4 68MB
  43. DEF CON 26 Conference - Eyal Itkin, Yaniv Balmas - What the Fax-!.mp4 67MB
  44. DEF CON 26 Conference - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries.mp4 67MB
  45. DEF CON 26 Conference - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug.mp4 65MB
  46. DEF CON 26 Conference - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras.mp4 63MB
  47. DEF CON 26 Conference - singe - Practical and Improved Wifi MitM with Mana.mp4 62MB
  48. DEF CON 26 Conference - Champion and Law - Building the Hacker Tracker.mp4 61MB
  49. DEF CON 26 Conference - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities.mp4 60MB
  50. DEF CON 26 Conference - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You.mp4 60MB
  51. DEF CON 26 Conference - Egypt and Vu - One-liners to Rule Them All.mp4 59MB
  52. DEF CON 26 Conference - Steven Danneman - Your Banks Digital Side Door.mp4 58MB
  53. DEF CON 26 Conference - Ian Haken - Automated Discovery of Deserialization Gadget Chains.mp4 58MB
  54. DEF CON 26 Conference - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit.mp4 58MB
  55. DEF CON 26 Conference - Nafeez - Compression Oracle Attacks on VPN Networks.mp4 58MB
  56. DEF CON 26 Conference - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers.mp4 57MB
  57. DEF CON 26 Conference - Patrick Wardle - The Mouse is Mightier than the Sword.mp4 56MB
  58. DEF CON 26 Conference - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones.mp4 56MB
  59. DEF CON 26 Conference - Daniel Crowley and Panel - Outsmarting the Smart City.mp4 56MB
  60. DEF CON 26 Conference - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures.mp4 55MB
  61. DEF CON 26 Conference - smea - Jailbreaking the 3DS through 7 years of hardening.mp4 55MB
  62. DEF CON 26 Conference - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out.mp4 54MB
  63. DEF CON 26 Conference - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband.mp4 54MB
  64. DEF CON 26 Conference - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more.mp4 53MB
  65. DEF CON 26 Conference - Christopher Domas - The ring 0 facade awakening the processors inner demons.mp4 53MB
  66. DEF CON 26 Conference - Alguacil and Murillo Moya - Playback a TLS 1 point 3 story.mp4 50MB
  67. DEF CON 26 Conference - Yu Wang - Attacking the macOS Kernel Graphics Driver.mp4 50MB
  68. DEF CON 26 Conference - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits.mp4 50MB
  69. DEF CON 26 Conference - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices.mp4 50MB
  70. DEF CON 26 Conference - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch.mp4 49MB
  71. DEF CON 26 Conference - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data.mp4 49MB
  72. DEF CON 26 Conference - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications.mp4 48MB
  73. DEF CON 26 Conference - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts.mp4 48MB
  74. DEF CON 26 Conference - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home.mp4 48MB
  75. DEF CON 26 Conference - Zeng and Panel - Lora Smart Water Meter Security Analysis.mp4 46MB
  76. DEF CON 26 Conference - Jeanette Manfra - Securing our Nations Election Infrastructure.mp4 45MB
  77. DEF CON 26 Conference - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains.mp4 45MB
  78. DEF CON 26 Conference - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading.mp4 44MB
  79. DEF CON 26 Conference - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems.mp4 44MB
  80. DEF CON 26 Conference - Slava Makkaveev - Man-In-The-Disk.mp4 42MB
  81. DEF CON 26 Conference - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems.mp4 42MB
  82. DEF CON 26 Conference - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray.mp4 42MB
  83. DEF CON 26 Conference - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear.mp4 41MB
  84. DEF CON 26 Conference - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses.mp4 41MB
  85. DEF CON 26 Conference - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication.mp4 40MB
  86. DEF CON 26 Conference - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit.mp4 39MB
  87. DEF CON 26 Conference - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts.mp4 39MB
  88. DEF CON 26 Conference - Maggie Mayhem - Sex Work After SESTA FOSTA.mp4 37MB
  89. DEF CON 26 Conference - William Martin - One-Click to OWA.mp4 36MB
  90. DEF CON 26 Conference - West and Campbell - barcOwned Popping shells with your cereal box.mp4 36MB
  91. DEF CON 26 Conference - Matt King - Micro-Renovator Bringing Processor Firmware up to Code.mp4 36MB
  92. DEF CON 26 Conference - Truman Kain - Dragnet Your Social Engineering Sidekick.mp4 35MB
  93. DEF CON 26 Conference - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly.mp4 32MB
  94. DEF CON 26 Conference - 0x200b - Detecting Blue Team Research Through Targeted Ads.mp4 31MB
  95. DEF CON 26 Conference - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems.mp4 30MB
  96. DEF CON 26 Conference - Zach and Alex - Infecting The Embedded Supply Chain.mp4 29MB
  97. DEF CON 26 Conference - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller.mp4 29MB
  98. DEF CON 26 Conference - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers.mp4 29MB
  99. DEF CON 26 Conference - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox.mp4 27MB
  100. DEF CON 26 Conference - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era.mp4 25MB
  101. DEF CON 26 Conference - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls.mp4 25MB
  102. DEF CON 26 Conference - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones.mp4 24MB
  103. DEF CON 26 Conference - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries.mp4 22MB
  104. DEF CON 26 Conference - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program.mp4 22MB
  105. DEF CON 26 Conference - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking.mp4 21MB
  106. DEF CON 26 Conference - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators.mp4 21MB
  107. DEF CON 26 Conference - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask.srt 94KB
  108. DEF CON 26 Conference - The Dark Tangent - DEF CON 26 Closing Ceremonies.srt 91KB
  109. DEF CON 26 Conference - Dr Cindy Poppins AKA Svea Eckert and Panel - Inside the Fake Science Factory.srt 86KB
  110. DEF CON 26 Conference - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems.srt 69KB
  111. DEF CON 26 Conference - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator.srt 69KB
  112. DEF CON 26 Conference - Joe Grand - Searching for the Light Adventures with OpticSpy.srt 69KB
  113. DEF CON 26 Conference - smea - Jailbreaking the 3DS through 7 years of hardening.srt 67KB
  114. DEF CON 26 Conference - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals.srt 66KB
  115. DEF CON 26 Conference - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs.srt 66KB
  116. DEF CON 26 Conference - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills.srt 64KB
  117. DEF CON 26 Conference - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010.srt 64KB
  118. DEF CON 26 Conference - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine.srt 62KB
  119. DEF CON 26 Conference - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband.srt 62KB
  120. DEF CON 26 Conference - Sean Metcalf - Exploiting Active Directory Administrator Insecurities.srt 61KB
  121. DEF CON 26 Conference - Ian Haken - Automated Discovery of Deserialization Gadget Chains.srt 59KB
  122. DEF CON 26 Conference - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs.srt 58KB
  123. DEF CON 26 Conference - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits.srt 58KB
  124. DEF CON 26 Conference - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices.srt 56KB
  125. DEF CON 26 Conference - The Dark Tangent and Panel - Panel DEF CON GROUPS.srt 56KB
  126. DEF CON 26 Conference - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System.srt 56KB
  127. DEF CON 26 Conference - Patrick Wardle - The Mouse is Mightier than the Sword.srt 56KB
  128. DEF CON 26 Conference - Nirenberg and Buchwald - Reverse Engineering hacking documentary series.srt 56KB
  129. DEF CON 26 Conference - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities.srt 55KB
  130. DEF CON 26 Conference - Ossmann and Spill - Revolting Radios.srt 55KB
  131. DEF CON 26 Conference - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home.srt 54KB
  132. DEF CON 26 Conference - Panel - DC 101 PANEL.srt 54KB
  133. DEF CON 26 Conference - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession.srt 53KB
  134. DEF CON 26 Conference - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain.srt 53KB
  135. DEF CON 26 Conference - Rob Joyce - NSA Talks Cybersecurity.srt 52KB
  136. DEF CON 26 Conference - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries.srt 51KB
  137. DEF CON 26 Conference - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications.srt 51KB
  138. DEF CON 26 Conference - Matt Wixey - Betrayed by the keyboard How what you type can give you away.srt 51KB
  139. DEF CON 26 Conference - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries.srt 51KB
  140. DEF CON 26 Conference - Steven Danneman - Your Banks Digital Side Door.srt 51KB
  141. DEF CON 26 Conference - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult.srt 50KB
  142. DEF CON 26 Conference - Balmas and Itkin - What the Fax.srt 50KB
  143. DEF CON 26 Conference - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.srt 50KB
  144. DEF CON 26 Conference - singe - Practical and Improved Wifi MitM with Mana.srt 50KB
  145. DEF CON 26 Conference - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework.srt 49KB
  146. DEF CON 26 Conference - Levison and hon1nbo - Booby Trapping Boxes.srt 48KB
  147. DEF CON 26 Conference - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more.srt 48KB
  148. DEF CON 26 Conference - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps.srt 47KB
  149. DEF CON 26 Conference - Shkatov and Michael - UEFI Exploitation for the Masses.srt 47KB
  150. DEF CON 26 Conference - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk.srt 46KB
  151. DEF CON 26 Conference - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices.srt 46KB
  152. DEF CON 26 Conference - Nafeez - Compression Oracle Attacks on VPN Networks.srt 46KB
  153. DEF CON 26 Conference - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras.srt 46KB
  154. DEF CON 26 Conference - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill.srt 44KB
  155. DEF CON 26 Conference - William Martin - SMBetray Backdooring and breaking signatures.srt 44KB
  156. DEF CON 26 Conference - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems.srt 44KB
  157. DEF CON 26 Conference - Egypt and Vu - One-liners to Rule Them All.srt 44KB
  158. DEF CON 26 Conference - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit.srt 43KB
  159. DEF CON 26 Conference - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems.srt 42KB
  160. DEF CON 26 Conference - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures.srt 41KB
  161. DEF CON 26 Conference - Rob Joyce - Building Absurd Christmas Light Shows.srt 41KB
  162. DEF CON 26 Conference - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts.srt 40KB
  163. DEF CON 26 Conference - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication.srt 40KB
  164. DEF CON 26 Conference - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability.srt 39KB
  165. DEF CON 26 Conference - Delta Zero and Azeem Aqil - Your Voice is My Passport.srt 39KB
  166. DEF CON 26 Conference - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers.srt 39KB
  167. DEF CON 26 Conference - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out.srt 38KB
  168. DEF CON 26 Conference - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks.srt 38KB
  169. DEF CON 26 Conference - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware.srt 37KB
  170. DEF CON 26 Conference - HuiYu and Qian - Breaking Smart Speakers We are Listening to You.srt 37KB
  171. DEF CON 26 Conference - Daniel Crowley and Panel - Outsmarting the Smart City.srt 36KB
  172. DEF CON 26 Conference - yawnbox - Privacy Infrastructure Challenges and Opportunities.srt 36KB
  173. DEF CON 26 Conference - Champion and Law - Building the Hacker Tracker.srt 35KB
  174. DEF CON 26 Conference - Alguacil and Murillo Moya - Playback a TLS 1 point 3 story.srt 33KB
  175. DEF CON 26 Conference - sghctoma - All Your Math are Belong to Us.srt 33KB
  176. DEF CON 26 Conference - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch.srt 32KB
  177. DEF CON 26 Conference - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug.srt 32KB
  178. DEF CON 26 Conference - Christopher Domas - The ring 0 facade awakening the processors inner demons.srt 31KB
  179. DEF CON 26 Conference - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains.srt 31KB
  180. DEF CON 26 Conference - 0x200b - Detecting Blue Team Research Through Targeted Ads.srt 28KB
  181. DEF CON 26 Conference - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit.srt 28KB
  182. DEF CON 26 Conference - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems.srt 27KB
  183. DEF CON 26 Conference - Yu Wang - Attacking the macOS Kernel Graphics Driver.srt 27KB
  184. DEF CON 26 Conference - Zach and Alex - Infecting The Embedded Supply Chain.srt 26KB
  185. DEF CON 26 Conference - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls.srt 26KB
  186. DEF CON 26 Conference - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems.srt 26KB
  187. DEF CON 26 Conference - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones.srt 26KB
  188. DEF CON 26 Conference - Jeanette Manfra - Securing our Nations Election Infrastructure.srt 26KB
  189. DEF CON 26 Conference - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking.srt 25KB
  190. DEF CON 26 Conference - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts.srt 25KB
  191. DEF CON 26 Conference - William Martin - One-Click to OWA.srt 25KB
  192. DEF CON 26 Conference - Maggie Mayhem - Sex Work After SESTA FOSTA.srt 25KB
  193. DEF CON 26 Conference - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly.srt 24KB
  194. DEF CON 26 Conference - West and Campbell - barcOwned Popping shells with your cereal box.srt 23KB
  195. DEF CON 26 Conference - Truman Kain - Dragnet Your Social Engineering Sidekick.srt 23KB
  196. DEF CON 26 Conference - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses.srt 23KB
  197. DEF CON 26 Conference - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray.srt 21KB
  198. DEF CON 26 Conference - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You.srt 21KB
  199. DEF CON 26 Conference - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear.srt 21KB
  200. DEF CON 26 Conference - Zeng and Panel - Lora Smart Water Meter Security Analysis.srt 21KB
  201. DEF CON 26 Conference - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers.srt 21KB
  202. DEF CON 26 Conference - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era.srt 20KB
  203. DEF CON 26 Conference - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries.srt 20KB
  204. DEF CON 26 Conference - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones.srt 20KB
  205. DEF CON 26 Conference - Matt King - Micro-Renovator Bringing Processor Firmware up to Code.srt 20KB
  206. DEF CON 26 Conference - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data.srt 19KB
  207. DEF CON 26 Conference - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller.srt 17KB
  208. DEF CON 26 Conference - Slava Makkaveev - Man-In-The-Disk.srt 17KB
  209. DEF CON 26 Conference - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox.srt 17KB
  210. DEF CON 26 Conference - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program.srt 16KB
  211. DEF CON 26 Conference - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts.srt 16KB
  212. DEF CON 26 Conference - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading.srt 15KB
  213. DEF CON 26 Conference - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators.srt 14KB