Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
DEF CON 26 Conference - 0x200b - Detecting Blue Team Research Through Targeted Ads.mp4 |
31.43Мб |
DEF CON 26 Conference - 0x200b - Detecting Blue Team Research Through Targeted Ads.srt |
28.50Кб |
DEF CON 26 Conference - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses.mp4 |
40.69Мб |
DEF CON 26 Conference - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses.srt |
22.80Кб |
DEF CON 26 Conference - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator.mp4 |
80.32Мб |
DEF CON 26 Conference - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator.srt |
68.81Кб |
DEF CON 26 Conference - Alguacil and Murillo Moya - Playback a TLS 1 point 3 story.mp4 |
50.11Мб |
DEF CON 26 Conference - Alguacil and Murillo Moya - Playback a TLS 1 point 3 story.srt |
33.27Кб |
DEF CON 26 Conference - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era.mp4 |
24.73Мб |
DEF CON 26 Conference - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era.srt |
20.40Кб |
DEF CON 26 Conference - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers.mp4 |
28.68Мб |
DEF CON 26 Conference - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers.srt |
20.71Кб |
DEF CON 26 Conference - Balmas and Itkin - What the Fax.srt |
50.05Кб |
DEF CON 26 Conference - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug.mp4 |
65.45Мб |
DEF CON 26 Conference - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug.srt |
31.52Кб |
DEF CON 26 Conference - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication.mp4 |
40.41Мб |
DEF CON 26 Conference - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication.srt |
39.61Кб |
DEF CON 26 Conference - Champion and Law - Building the Hacker Tracker.mp4 |
61.32Мб |
DEF CON 26 Conference - Champion and Law - Building the Hacker Tracker.srt |
35.11Кб |
DEF CON 26 Conference - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs.mp4 |
112.86Мб |
DEF CON 26 Conference - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs.srt |
65.58Кб |
DEF CON 26 Conference - Christopher Domas - The ring 0 facade awakening the processors inner demons.mp4 |
52.95Мб |
DEF CON 26 Conference - Christopher Domas - The ring 0 facade awakening the processors inner demons.srt |
30.74Кб |
DEF CON 26 Conference - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts.mp4 |
103.95Мб |
DEF CON 26 Conference - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts.srt |
40.13Кб |
DEF CON 26 Conference - Daniel Crowley and Panel - Outsmarting the Smart City.mp4 |
55.55Мб |
DEF CON 26 Conference - Daniel Crowley and Panel - Outsmarting the Smart City.srt |
36.04Кб |
DEF CON 26 Conference - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills.mp4 |
148.54Мб |
DEF CON 26 Conference - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills.srt |
63.70Кб |
DEF CON 26 Conference - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones.mp4 |
56.01Мб |
DEF CON 26 Conference - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones.srt |
25.76Кб |
DEF CON 26 Conference - Delta Zero and Azeem Aqil - Your Voice is My Passport.mp4 |
99.05Мб |
DEF CON 26 Conference - Delta Zero and Azeem Aqil - Your Voice is My Passport.srt |
38.91Кб |
DEF CON 26 Conference - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices.mp4 |
49.63Мб |
DEF CON 26 Conference - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices.srt |
56.42Кб |
DEF CON 26 Conference - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals.mp4 |
126.54Мб |
DEF CON 26 Conference - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals.srt |
66.05Кб |
DEF CON 26 Conference - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System.mp4 |
69.62Мб |
DEF CON 26 Conference - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System.srt |
56.12Кб |
DEF CON 26 Conference - Dr Cindy Poppins AKA Svea Eckert and Panel - Inside the Fake Science Factory.srt |
86.45Кб |
DEF CON 26 Conference - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill.mp4 |
80.55Мб |
DEF CON 26 Conference - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill.srt |
44.09Кб |
DEF CON 26 Conference - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps.mp4 |
67.99Мб |
DEF CON 26 Conference - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps.srt |
46.94Кб |
DEF CON 26 Conference - Egypt and Vu - One-liners to Rule Them All.mp4 |
59.38Мб |
DEF CON 26 Conference - Egypt and Vu - One-liners to Rule Them All.srt |
43.61Кб |
DEF CON 26 Conference - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask.mp4 |
249.19Мб |
DEF CON 26 Conference - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask.srt |
93.83Кб |
DEF CON 26 Conference - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You.mp4 |
59.90Мб |
DEF CON 26 Conference - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You.srt |
20.87Кб |
DEF CON 26 Conference - Eyal Itkin, Yaniv Balmas - What the Fax-!.mp4 |
67.24Мб |
DEF CON 26 Conference - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains.mp4 |
44.75Мб |
DEF CON 26 Conference - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains.srt |
30.66Кб |
DEF CON 26 Conference - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries.mp4 |
107.19Мб |
DEF CON 26 Conference - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries.srt |
51.35Кб |
DEF CON 26 Conference - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010.mp4 |
112.11Мб |
DEF CON 26 Conference - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010.srt |
63.59Кб |
DEF CON 26 Conference - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.mp4 |
90.68Мб |
DEF CON 26 Conference - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.srt |
49.97Кб |
DEF CON 26 Conference - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray.mp4 |
41.58Мб |
DEF CON 26 Conference - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray.srt |
21.27Кб |
DEF CON 26 Conference - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries.mp4 |
66.95Мб |
DEF CON 26 Conference - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries.srt |
51.29Кб |
DEF CON 26 Conference - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program.mp4 |
22.03Мб |
DEF CON 26 Conference - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program.srt |
16.49Кб |
DEF CON 26 Conference - HuiYu and Qian - Breaking Smart Speakers We are Listening to You.mp4 |
69.94Мб |
DEF CON 26 Conference - HuiYu and Qian - Breaking Smart Speakers We are Listening to You.srt |
36.85Кб |
DEF CON 26 Conference - Ian Haken - Automated Discovery of Deserialization Gadget Chains.mp4 |
58.31Мб |
DEF CON 26 Conference - Ian Haken - Automated Discovery of Deserialization Gadget Chains.srt |
59.25Кб |
DEF CON 26 Conference - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones.mp4 |
24.25Мб |
DEF CON 26 Conference - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones.srt |
19.75Кб |
DEF CON 26 Conference - Jeanette Manfra - Securing our Nations Election Infrastructure.mp4 |
45.15Мб |
DEF CON 26 Conference - Jeanette Manfra - Securing our Nations Election Infrastructure.srt |
25.54Кб |
DEF CON 26 Conference - Joe Grand - Searching for the Light Adventures with OpticSpy.mp4 |
107.39Мб |
DEF CON 26 Conference - Joe Grand - Searching for the Light Adventures with OpticSpy.srt |
68.66Кб |
DEF CON 26 Conference - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework.mp4 |
119.78Мб |
DEF CON 26 Conference - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework.srt |
49.28Кб |
DEF CON 26 Conference - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices.mp4 |
96.04Мб |
DEF CON 26 Conference - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices.srt |
45.90Кб |
DEF CON 26 Conference - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more.mp4 |
53.27Мб |
DEF CON 26 Conference - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more.srt |
47.55Кб |
DEF CON 26 Conference - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras.mp4 |
63.48Мб |
DEF CON 26 Conference - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras.srt |
45.50Кб |
DEF CON 26 Conference - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch.mp4 |
49.14Мб |
DEF CON 26 Conference - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch.srt |
32.44Кб |
DEF CON 26 Conference - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities.mp4 |
59.99Мб |
DEF CON 26 Conference - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities.srt |
54.96Кб |
DEF CON 26 Conference - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems.mp4 |
69.07Мб |
DEF CON 26 Conference - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems.srt |
69.01Кб |
DEF CON 26 Conference - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home.mp4 |
47.56Мб |
DEF CON 26 Conference - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home.srt |
54.41Кб |
DEF CON 26 Conference - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking.mp4 |
21.01Мб |
DEF CON 26 Conference - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking.srt |
25.48Кб |
DEF CON 26 Conference - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine.mp4 |
89.12Мб |
DEF CON 26 Conference - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine.srt |
62.30Кб |
DEF CON 26 Conference - Levison and hon1nbo - Booby Trapping Boxes.mp4 |
139.85Мб |
DEF CON 26 Conference - Levison and hon1nbo - Booby Trapping Boxes.srt |
48.01Кб |
DEF CON 26 Conference - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems.mp4 |
29.91Мб |
DEF CON 26 Conference - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems.srt |
25.79Кб |
DEF CON 26 Conference - Maggie Mayhem - Sex Work After SESTA FOSTA.mp4 |
36.68Мб |
DEF CON 26 Conference - Maggie Mayhem - Sex Work After SESTA FOSTA.srt |
24.75Кб |
DEF CON 26 Conference - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware.mp4 |
67.79Мб |
DEF CON 26 Conference - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware.srt |
37.17Кб |
DEF CON 26 Conference - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems.mp4 |
41.61Мб |
DEF CON 26 Conference - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems.srt |
26.84Кб |
DEF CON 26 Conference - Matt King - Micro-Renovator Bringing Processor Firmware up to Code.mp4 |
36.19Мб |
DEF CON 26 Conference - Matt King - Micro-Renovator Bringing Processor Firmware up to Code.srt |
19.57Кб |
DEF CON 26 Conference - Matt Wixey - Betrayed by the keyboard How what you type can give you away.mp4 |
110.84Мб |
DEF CON 26 Conference - Matt Wixey - Betrayed by the keyboard How what you type can give you away.srt |
51.31Кб |
DEF CON 26 Conference - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit.mp4 |
58.24Мб |
DEF CON 26 Conference - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit.srt |
42.71Кб |
DEF CON 26 Conference - Nafeez - Compression Oracle Attacks on VPN Networks.mp4 |
58.07Мб |
DEF CON 26 Conference - Nafeez - Compression Oracle Attacks on VPN Networks.srt |
45.74Кб |
DEF CON 26 Conference - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators.mp4 |
20.71Мб |
DEF CON 26 Conference - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators.srt |
14.25Кб |
DEF CON 26 Conference - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers.mp4 |
56.60Мб |
DEF CON 26 Conference - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers.srt |
38.87Кб |
DEF CON 26 Conference - Nirenberg and Buchwald - Reverse Engineering hacking documentary series.mp4 |
163.83Мб |
DEF CON 26 Conference - Nirenberg and Buchwald - Reverse Engineering hacking documentary series.srt |
55.65Кб |
DEF CON 26 Conference - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out.mp4 |
53.91Мб |
DEF CON 26 Conference - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out.srt |
38.42Кб |
DEF CON 26 Conference - Ossmann and Spill - Revolting Radios.mp4 |
139.77Мб |
DEF CON 26 Conference - Ossmann and Spill - Revolting Radios.srt |
54.83Кб |
DEF CON 26 Conference - Panel - DC 101 PANEL.mp4 |
186.63Мб |
DEF CON 26 Conference - Panel - DC 101 PANEL.srt |
53.99Кб |
DEF CON 26 Conference - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks.mp4 |
108.16Мб |
DEF CON 26 Conference - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks.srt |
38.06Кб |
DEF CON 26 Conference - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls.mp4 |
24.67Мб |
DEF CON 26 Conference - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls.srt |
25.92Кб |
DEF CON 26 Conference - Patrick Wardle - The Mouse is Mightier than the Sword.mp4 |
56.24Мб |
DEF CON 26 Conference - Patrick Wardle - The Mouse is Mightier than the Sword.srt |
55.86Кб |
DEF CON 26 Conference - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession.mp4 |
172.43Мб |
DEF CON 26 Conference - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession.srt |
53.04Кб |
DEF CON 26 Conference - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems.mp4 |
99.64Мб |
DEF CON 26 Conference - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems.srt |
42.38Кб |
DEF CON 26 Conference - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain.mp4 |
79.35Мб |
DEF CON 26 Conference - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain.srt |
52.92Кб |
DEF CON 26 Conference - Rob Joyce - Building Absurd Christmas Light Shows.mp4 |
73.15Мб |
DEF CON 26 Conference - Rob Joyce - Building Absurd Christmas Light Shows.srt |
40.98Кб |
DEF CON 26 Conference - Rob Joyce - NSA Talks Cybersecurity.mp4 |
126.19Мб |
DEF CON 26 Conference - Rob Joyce - NSA Talks Cybersecurity.srt |
52.05Кб |
DEF CON 26 Conference - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data.mp4 |
48.91Мб |
DEF CON 26 Conference - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data.srt |
18.67Кб |
DEF CON 26 Conference - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly.mp4 |
32.21Мб |
DEF CON 26 Conference - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly.srt |
24.37Кб |
DEF CON 26 Conference - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems.mp4 |
43.85Мб |
DEF CON 26 Conference - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems.srt |
43.70Кб |
DEF CON 26 Conference - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading.mp4 |
43.95Мб |
DEF CON 26 Conference - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading.srt |
14.83Кб |
DEF CON 26 Conference - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries.mp4 |
22.42Мб |
DEF CON 26 Conference - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries.srt |
19.98Кб |
DEF CON 26 Conference - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband.mp4 |
53.80Мб |
DEF CON 26 Conference - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband.srt |
62.24Кб |
DEF CON 26 Conference - Sean Metcalf - Exploiting Active Directory Administrator Insecurities.mp4 |
133.11Мб |
DEF CON 26 Conference - Sean Metcalf - Exploiting Active Directory Administrator Insecurities.srt |
60.97Кб |
DEF CON 26 Conference - sghctoma - All Your Math are Belong to Us.mp4 |
88.63Мб |
DEF CON 26 Conference - sghctoma - All Your Math are Belong to Us.srt |
32.67Кб |
DEF CON 26 Conference - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts.mp4 |
38.88Мб |
DEF CON 26 Conference - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts.srt |
15.96Кб |
DEF CON 26 Conference - Shkatov and Michael - UEFI Exploitation for the Masses.mp4 |
73.65Мб |
DEF CON 26 Conference - Shkatov and Michael - UEFI Exploitation for the Masses.srt |
46.76Кб |
DEF CON 26 Conference - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult.mp4 |
87.17Мб |
DEF CON 26 Conference - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult.srt |
50.32Кб |
DEF CON 26 Conference - singe - Practical and Improved Wifi MitM with Mana.mp4 |
61.57Мб |
DEF CON 26 Conference - singe - Practical and Improved Wifi MitM with Mana.srt |
49.94Кб |
DEF CON 26 Conference - Slava Makkaveev - Man-In-The-Disk.mp4 |
41.88Мб |
DEF CON 26 Conference - Slava Makkaveev - Man-In-The-Disk.srt |
16.95Кб |
DEF CON 26 Conference - smea - Jailbreaking the 3DS through 7 years of hardening.mp4 |
54.53Мб |
DEF CON 26 Conference - smea - Jailbreaking the 3DS through 7 years of hardening.srt |
67.15Кб |
DEF CON 26 Conference - Steven Danneman - Your Banks Digital Side Door.mp4 |
58.44Мб |
DEF CON 26 Conference - Steven Danneman - Your Banks Digital Side Door.srt |
50.70Кб |
DEF CON 26 Conference - The Dark Tangent and Panel - Panel DEF CON GROUPS.mp4 |
173.35Мб |
DEF CON 26 Conference - The Dark Tangent and Panel - Panel DEF CON GROUPS.srt |
56.24Кб |
DEF CON 26 Conference - The Dark Tangent - DEF CON 26 Closing Ceremonies.mp4 |
357.11Мб |
DEF CON 26 Conference - The Dark Tangent - DEF CON 26 Closing Ceremonies.srt |
90.74Кб |
DEF CON 26 Conference - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk.mp4 |
157.66Мб |
DEF CON 26 Conference - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk.srt |
46.25Кб |
DEF CON 26 Conference - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs.mp4 |
141.09Мб |
DEF CON 26 Conference - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs.srt |
58.48Кб |
DEF CON 26 Conference - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures.mp4 |
55.34Мб |
DEF CON 26 Conference - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures.srt |
41.38Кб |
DEF CON 26 Conference - Truman Kain - Dragnet Your Social Engineering Sidekick.mp4 |
35.35Мб |
DEF CON 26 Conference - Truman Kain - Dragnet Your Social Engineering Sidekick.srt |
22.81Кб |
DEF CON 26 Conference - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit.mp4 |
39.34Мб |
DEF CON 26 Conference - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit.srt |
28.35Кб |
DEF CON 26 Conference - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications.mp4 |
47.76Мб |
DEF CON 26 Conference - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications.srt |
51.33Кб |
DEF CON 26 Conference - West and Campbell - barcOwned Popping shells with your cereal box.mp4 |
36.25Мб |
DEF CON 26 Conference - West and Campbell - barcOwned Popping shells with your cereal box.srt |
23.09Кб |
DEF CON 26 Conference - William Martin - One-Click to OWA.mp4 |
36.48Мб |
DEF CON 26 Conference - William Martin - One-Click to OWA.srt |
25.09Кб |
DEF CON 26 Conference - William Martin - SMBetray Backdooring and breaking signatures.mp4 |
104.61Мб |
DEF CON 26 Conference - William Martin - SMBetray Backdooring and breaking signatures.srt |
43.79Кб |
DEF CON 26 Conference - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller.mp4 |
28.80Мб |
DEF CON 26 Conference - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller.srt |
17.03Кб |
DEF CON 26 Conference - yawnbox - Privacy Infrastructure Challenges and Opportunities.mp4 |
76.44Мб |
DEF CON 26 Conference - yawnbox - Privacy Infrastructure Challenges and Opportunities.srt |
35.78Кб |
DEF CON 26 Conference - Yu Wang - Attacking the macOS Kernel Graphics Driver.mp4 |
50.09Мб |
DEF CON 26 Conference - Yu Wang - Attacking the macOS Kernel Graphics Driver.srt |
26.72Кб |
DEF CON 26 Conference - Zach and Alex - Infecting The Embedded Supply Chain.mp4 |
29.39Мб |
DEF CON 26 Conference - Zach and Alex - Infecting The Embedded Supply Chain.srt |
26.46Кб |
DEF CON 26 Conference - Zeng and Panel - Lora Smart Water Meter Security Analysis.mp4 |
45.61Мб |
DEF CON 26 Conference - Zeng and Panel - Lora Smart Water Meter Security Analysis.srt |
20.81Кб |
DEF CON 26 Conference - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear.mp4 |
41.28Мб |
DEF CON 26 Conference - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear.srt |
20.87Кб |
DEF CON 26 Conference - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits.mp4 |
50.08Мб |
DEF CON 26 Conference - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits.srt |
58.24Кб |
DEF CON 26 Conference - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox.mp4 |
27.09Мб |
DEF CON 26 Conference - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox.srt |
16.71Кб |
DEF CON 26 Conference - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability.mp4 |
101.00Мб |
DEF CON 26 Conference - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability.srt |
39.42Кб |
DEF CON 26 Conference - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts.mp4 |
47.73Мб |
DEF CON 26 Conference - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts.srt |
25.37Кб |