Search Torrents
DEF CON 22 presentations...
Seeders: 59 Leechers: 0
DEF CON 22 presentations Torrent content (File list)
|
---|
Gene Bransfeild - Updated/DEFCON-22-Gene-Bransfield-Weaponizing-your-Pets-UPDATED.pdf 62.2 MB |
Celine and Elie Bursztein - Updated/DEFCON-22-Celine-and-Elie-Bursztein-I-am-a-legend-UPDATED.pdf 49.3 MB |
Will Schroeder/DEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf 48.8 MB |
Dominic White and Ian de Villiers - Updated/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-onscreen-Updated.pdf 48.6 MB |
Dhia Mahjoub, Andree Toonk, and Thibault Reuille - Updated/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf 44.7 MB |
Ladar Levison and Stephen Watt - Updated/DEFCON-22-Levison-Watt-Dark-Mail-UPDATED.pdf 37.5 MB |
Joe Fitzpatrick and Miles Crabill - Updated/DEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe-UPDATED.pdf 36.6 MB |
Heres, Etemadieh, Baker and Nielsen - Updated/DEFCON-22-Heres-Etemadieh-Baker-Nielsen-Hack-All-The-Things-UPDATED.pdf 35.6 MB |
Jesse Michael and Mickey Shkatov - Updated/Jesse Michael and Mickey Shkatov - Extras.zip 34.6 MB |
Fatih Ozavci - Updated/DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones-UPDATED.pdf 33.8 MB |
Colby Moore and Patrick Wardle - Updated/DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam-Updated.pdf 30.2 MB |
Dominic White and Ian de Villiers - Updated/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdf 30.2 MB |
Kenneth White and Matthew Green - Updated/DEFCON-22-Kenneth-White-and-Matthew-Green-The-Open-Crypto-Audit-Project-Updated.pdf 30.1 MB |
Andrew Hunt - Updated/DEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise-UPDATED.pdf 26.3 MB |
Brian Gorenc and Matt Molinyawe -Updated/Brian Gorenc and Matt Molinyawe - Extras.zip 26.1 MB |
Glenn Wilkinson - Updated/DEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance-UPDATED.pdf 26.0 MB |
Rmellendick and DaKahuna - Updated/DEFCON-22-Rmellendick-Dakahuna-RF-Penetration-Testing-Your-Air-Stinks-UPDATED.pdf 25.1 MB |
Phil Polstra - Updated/DEFCON-22-Phil-Polstra-Am-I-Being-Spied-On-Updated.pdf 22.2 MB |
Brian Gorenc and Matt Molinyawe -Updated/DEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly-UPDATED.pdf 19.8 MB |
Zoz - Updated/DEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdf 19.2 MB |
Deviant Ollam and Howard Payne/DEFCON-22-Deviant-Ollam-and-Howard-Payne-Elevator Hacking-From-the-Pit-to-the-Penthouse.pdf 18.5 MB |
Andrew Hunt - Updated/DEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise.pdf 17.2 MB |
Jim Denaro and Tod Beardsley - Updated/DEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit-UPDATED.pdf 17.0 MB |
Zoz - Updated/DEFCON-22-Zoz-Dont-Fuck-It-Up.pdf 16.7 MB |
Sarah Edwards/DEFCON-22-Sarah-Edwards-Reverse-Engineering-Mac-Malware.pdf 15.1 MB |
Alijohn Ghassemlouei - Updated/DEFCON-22-Alijohn-Ghassemlouei-Anatomy-of-a-Pentest-Updated.pdf 14.7 MB |
Grant Bugher - Updated/DEFCON-22-Grant-Bugher-Detecting-Bluetooth-Surveillance-Systems-Updated.pdf 14.0 MB |
Kyle Kelley and Greg Anderson - Updated/DEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe.-Updated.pdf 11.7 MB |
Bathurst, Rogers, Carey, and Clarke/DEFCON-22-Bathurst-Rogers-Carey-Clarke-PROPLANE.pdf 11.0 MB |
Grant Bugher - Updated/DEFCON-22-Grant-Bugher-Detecting-Bluetooth-Surveillance-Systems.pdf 10.9 MB |
Adrian Crenshaw - Updated/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf 10.8 MB |
Josh Datko and Teddy Reed - Updated/DEFCON-22-Josh-Datko-Teddy-Reed-NSA-Playset-DIY-Hardware-Implant-over-l2c-UPDATED.pdf 10.3 MB |
Aaron Bayles (AlxRogan) - Updated/DEFCON-22-Aaron-Bayles-Alxrogan-Protecting-SCADA-DC101.pdf 9.4 MB |
Alex Pinto and Kyle Maxwell - Updated/DEFCON-22-Pinto-Maxwell-Secure-Because-Math-Updated.pdf 9.4 MB |
Tim Strazzere and Jon Sawyer - Updated/DEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdf 8.9 MB |
John Menerick - Updated/DEFCON-22-John-Menerick-Open-Source-Fairy-Dust-UPDATED.pdf 8.7 MB |
Jake Kouns & Carsten Eiram - Updated/DEFCON-22-Kouns-Eiram-Screw-Becoming-A-Pentester-Bug-Bounty-Hunter-U{DATED.pdf 8.7 MB |
Alex Pinto and Kyle Maxwell - Updated/DEFCON-22-Pinto-and-Maxwell-Measuring-the-IQ-of-your-threat-feeds-TIQtest-Updated.pdf 8.6 MB |
Bulygin, Bazhaniul, Furtak, and Loucaides - Updated/DEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS.pdf 8.6 MB |
Gregory Pickett - Updated/DEFCON-22-Gregory-Pickett-Abusing-Software-Defined-Networks-UPDATED.pdf 8.3 MB |
Robert Rowley/DEFCON-22-Robert-Rowley-Detecting-Defending-Against-Surveillance-State.pdf 8.1 MB |
Nir Valtman - Updated/DEFCON-22-Nir-Valtman-Bug-Bounty-Programs-Evolution.pdf 8.1 MB |
Phillip Young - Updated/DEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes-Updated.pdf 7.9 MB |
Colby Moore and Patrick Wardle - Updated/DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam.pdf 7.9 MB |
Blake Self - Updated/DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdf 7.2 MB |
Eric (XlogicX) Davisson and Ruben Alejandro (chap0)/DEFCON-22-Eric-Davisson-Ruben-Alejandro-Abuse-of-Blind-Automation-in-Security-Tools.pdf 6.8 MB |
Ivan Petrov and Svetlana Gaivoronski - Updated/DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM.pdf 6.7 MB |
Joe Fitzpatrick and Miles Crabill - Updated/DEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe.pdf 6.6 MB |
Ivan Petrov and Svetlana Gaivoronski - Updated/DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM-Updated.pdf 6.3 MB |
Ryan Kazanciyan and Matt Hastings - Updated/DEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks-UPDATED.pdf 6.3 MB |
Wesley McGrew/Wesley McGrew - Extras.zip 6.2 MB |
Rmellendick and DaKahuna - Updated/DEFCON-22-Rmellendick-Dakahuna-RF-Penetration-Testing-Your-Air-Stinks.pdf 6.2 MB |
Jake Kouns & Carsten Eiram - Updated/DEFCON-22-Kouns-Eiram-Screw-Becoming-A-Pentester-Bug-Bounty-Hunter.pdf 5.9 MB |
Phil Polstra - Updated/DEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction-Updated.pdf 5.7 MB |
Joe Grand/DEFCON-22-Joe-Grand-Deconstructing-the-Circuit-Board-Sandwich.pdf 5.4 MB |
Paul Drapeau and Brent Dukes - Updated/DEFCON-22-Drapeau-Dukes-Steganography-in-Commonly-Used-HF-Radio-Protocols-UPDATED.pdf 5.3 MB |
Keren Elazari - Updated/DEFCON-22-Keren-Elazari-Empowering-Hackers-UPDATED.pdf 4.9 MB |
Quaddi, R3plicant, and Hefley - Updated/DEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911-UPDATED.pdf 4.9 MB |
Dustin Hoffman and Thomas Kinsey - Updated/DEFCON-22-Dustin-Hoffman-and-Thomas-Kinsey-What-the-Watchers-See-UPDATED.pdf 4.8 MB |
Nir Valtman - Updated/DEFCON-22-Nir-Valtman-A-Journey-To-Protect-POS-UPDATED.pdf 4.7 MB |
Maggie Jauregui - Updated/DEFCON-22-Maggie-Jauregui-Girl-Fault-Interrupted-Updated.pdf 4.7 MB |
Zoltán Balázs - Updated/DEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds-UPDATED.pdf 4.0 MB |
Felix Leder/DEFCON-22-Felix-Leder-NinjaTV.pdf 3.8 MB |
Weston Hecker - Updated/DEFCON-22-Weston-Hecker-Burner-Phone-DDOS-UPDATED.pdf 3.8 MB |
Paul Drapeau and Brent Dukes - Updated/DEFCON-22-Drapeau-Dukes-Steganography-in-Commonly-Used-HF-Radio-Protocols.pdf 3.7 MB |
Elijah - Updated/DEFCON-22-Eijah-Saving-Cyberspace-by-Reinventing-File-Sharing-Updated.pdf 3.7 MB |
Brady Bloxham - Updated/DEFCON-22-Brady-Bloxham-Windows-API-Abuse-UPDATED.pdf 3.7 MB |
Paul Such (0x222)/DEFCON-22-Paul-Such-0x222-Playing-with-Car-Firmware.pdf 3.6 MB |
Cesar Cerrudo - Updated/DEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems-UPDATED.pdf 3.4 MB |
Keren Elazari - Updated/DEFCON-22-Keren-Elazari-Empowering-Hackers.pdf 3.4 MB |
Adrian Crenshaw - Updated/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught.pdf 3.3 MB |
Shahar Tal - Updated/DEFCON-22-Shahar-TaI-I-hunt-TR-069-admins-UPDATED.pdf 3.3 MB |
Aaron Bayles (AlxRogan) - Updated/DEFCON-22-Aaron-Bayles-Alxrogan-Protecting-SCADA-DC101-Updated.pdf 2.9 MB |
Jesse Michael and Mickey Shkatov - Updated/DEFCON-22-Jesse-Michael-Mickey-Shkatov-USB-for-All!!-UPDATED.pdf 2.8 MB |
Bulygin, Bazhaniul, Furtak, and Loucaides - Updated/DEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS-UPDATED.pdf 2.7 MB |
Dhia Mahjoub, Andree Toonk, and Thibault Reuille - Updated/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style.pdf 2.7 MB |
Eric Smith and Joshua Perrymon - Updated/DEFCON-22-Smith-Perrymon-All-Your-Badges-Are-Belong-To-Us-UPDATED.pdf 2.6 MB |
Michael Ossman/DEFCON-22-Michael-Ossmann-Pierce-Toorcamp.pdf 2.5 MB |
Gene Bransfeild - Updated/DEFCON-22-Gene-Bransfield-Weaponizing-your-Pets.pdf 2.4 MB |
Alexandre Moneger - Updated/DEFCON-22-Alex-Moneger-Stitching-numbers-Generating-ROP-payloads-from-in-memory-numbers-UPDATED.pdf 2.2 MB |
Dominic White and Ian de Villiers - Updated/Dominic White and Ian de Villiers - Extras.zip 2.2 MB |
Geoff Mcdonald - Updated/DEFCON-22-Geoff-Mcdonald-Meddle-Framework-UPDATED.pdf 2.1 MB |
Alexandre Moneger - Updated/DEFCON-22-Alex-Moneger-Stitching-numbers-Generating-ROP-payloads-from-in-memory-numbers.pdf 2.1 MB |
Richard Theime - Updated/DEFCON-22-Theime-Truth-Through-Fiction-Updated.pdf 2.0 MB |
Mike Schrenk - Updated/DEFCON-22-Mike-Schrenk-Youre-Leaking-Trade-Secrets-UPDATED.pdf 2.0 MB |
Phillip Young - Updated/DEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes.pdf 2.0 MB |
Adam Wirth (SimonJ) - Updated/DEFCON-22-Adam-Wirth-SimonJ-Practical-Foxhunting-101-UPDATED.pdf 1.9 MB |
John Menerick - Updated/DEFCON-22-John-Menerick-Open-Source-Fairy-Dust.pdf 1.8 MB |
Ryan Kazanciyan and Matt Hastings - Updated/DEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks.pdf 1.8 MB |
Logan Lamb/DEFCON-22-Logan-Lamb-HOME-INSECURITY-NO-ALARMS-FALSE-ALARMS-AND-SIGINT.pdf 1.8 MB |
Lance Buttars (Nemus) - Updated/DEFCON-22-Lance-Buttars-Nemus-Intro-to-backdooring-OS-UPDATED.pdf 1.8 MB |
Jay Healey - Updated/DEFCON-22-Jay-Healey-Saving-the-Internet-UPDATED.pdf 1.7 MB |
Quaddi, R3plicant, and Hefley - Updated/DEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911.pdf 1.7 MB |
Dominic White and Ian de Villiers - Updated/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven.pdf 1.7 MB |
Luca Bruno and Mariano Graziano - Updated/DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass-Updated.pdf 1.6 MB |
Shahar Tal - Updated/DEFCON-22-Shahar-TaI-I-hunt-TR-069-admins.pdf 1.6 MB |
Corey Kallenberg - Updated/DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation-WP-UPDATED.pdf 1.6 MB |
Corey Kallenberg - Updated/DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation.pdf 1.5 MB |
Gregory Pickett - Updated/DEFCON-22-Gregory-Pickett-Abusing-Software-Defined-Networks.pdf 1.5 MB |
Weston Hecker - Updated/DEFCON-22-Weston-Hecker-Burner-Phone-DDOS.pdf 1.4 MB |
Zoltán Balázs - Updated/DEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds.pdf 1.4 MB |
Elijah - Updated/DEFCON-22-Eijah-Saving-Cyberspace-by-Reinventing-File-Sharing.pdf 1.4 MB |
Scott Erven and Shawn Merdinger - Updated/DEFCON-22-Scott-Erven-and-Shawn-Merdinger-Just-What-The-DR-Ordered-UPDATED.pdf 1.4 MB |
Tess Schrodinger/DEFCON-22-Tess-Schrodinger-Raxacoricofallapatorius-With-Love-Case-Studies.pdf 1.3 MB |
Glenn Wilkinson - Updated/DEFCON-22-Glenn-Wilkinson-GRW-WP.pdf 1.3 MB |
Alex Zacharis and Nikolaos Tsagkarakis/DEFCON-22-Alex Zacharis-Nikolaos-Tsagkarakis-PoS-Attacking-the-Traveling-Salesman.pdf 1.2 MB |
Holt, Smirnova, and Chua - Updated/DEFCON-22-Holt-Smirnova-Chua-Stolen-Data-Markets-Updated.pdf 1.1 MB |
Cesar Cerrudo - Updated/DEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems.pdf 1.1 MB |
Dhia Mahjoub, Andree Toonk, and Thibault Reuille - Updated/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-WP.pdf 1.0 MB |
Josh Corman and Nicholas Percoco - Updated/DEFCON-22-Josh-Corman-Nicholas-Percoco-Cavalry-Year-0-UPDATED.pdf 1.0 MB |
Corey Kallenberg - Updated/DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation-WP.pdf 1013.1 KB |
Shane Macaulay - Updated/DEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode-UPDATED.pdf 999.1 KB |
Alex Zacharis and Nikolaos Tsagkarakis/Alex Zacharis and Nikolaos Tsagkarakis - Extras.zip 989.3 KB |
Ivan Petrov and Svetlana Gaivoronski - Updated/DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM.avi 967.3 KB |
Jay Healey - Updated/DEFCON-22-Jay-Healey-Saving-the-Internet.pdf 963.0 KB |
Luca Bruno and Mariano Graziano - Updated/DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass.pdf 962.8 KB |
Chris Littlebury/DEFCON-22-Chris-Littlebury-Home-Alone-with-localhost.pdf 961.8 KB |
Glenn Wilkinson - Updated/DEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance.pdf 949.3 KB |
Fatih Ozavci - Updated/DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones.pdf 824.4 KB |
Maggie Jauregui - Updated/DEFCON-22-Maggie-Jauregui-Girl-Fault-Interrupted.pdf 814.5 KB |
Josh Datko and Teddy Reed - Updated/DEFCON-22-Josh-Datko-Teddy-Reed-NSA-Playset-DIY-Hardware-Implant-over-l2c.pdf 800.3 KB |
Metacortex and Grifter/DEFCON-22-Metacortex-Grifter-Darkside-of-the-internet.pdf 761.3 KB |
Andrew Hunt - Updated/DEFCON-22-Andrew-Hunt-MoCA-Overview-and-Security-Posture-WP.pdf 740.6 KB |
Jesse Michael and Mickey Shkatov - Updated/DEFCON-22-Jesse-Michael-Mickey-Shkatov-USB-for-All!!.pdf 705.8 KB |
Lance Buttars (Nemus) - Updated/DEFCON-22-Lance-Buttars-Nemus-Intro-to-backdooring-OS.pdf 693.7 KB |
Shane Macaulay - Updated/DEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode.pdf 656.9 KB |
Anton Sapozhnikov/DEFCON-22-Anton-Sapozhnikov-Acquire-Current-User-Hashes-Without-Admin-Privileges.pdf 597.9 KB |
Geoff Mcdonald - Updated/DEFCON-22-Geoff-Mcdonald-Meddle-Framework.pdf 591.1 KB |
Christopher Campbell/DEFCON-22-Christopher-Campbell-The-Secret-Life-of-Krbtgt.pdf 586.9 KB |
Jesus Molina/DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room.pdf 559.6 KB |
Wesley McGrew/DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware-WP.pdf 557.5 KB |
Richard Theime - Updated/Extras.zip 511.7 KB |
Blake Self - Updated/DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro.pdf 507.6 KB |
Graham, McMillan, and Tentler/DEFCON-22-Graham-McMillan-Tentler-Masscaning-the-Internet.pdf 492.9 KB |
Andrew Hunt - Updated/Andrew Hunt - Extras.zip 474.1 KB |
Brian Gorenc and Matt Molinyawe -Updated/DEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly.pdf 469.6 KB |
Wesley McGrew/DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware.pdf 455.2 KB |
Anch/DEFCON-22-Anch-The-Monkey-In-the-Middle.pdf 446.8 KB |
David Dorsey - Updated/DEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP-UPDATED.pdf 443.7 KB |
Andrew Hunt - Updated/DEFCON-22-Andrew-Hunt-Raspberry-MoCA-an-Automated-Penetration-Platform-WP.pdf 442.7 KB |
Kyle Kelley and Greg Anderson - Updated/DEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe.pdf 417.8 KB |
Luca Bruno and Mariano Graziano - Updated/DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass-WP-UPDATED.pdf 388.1 KB |
Nir Valtman - Updated/DEFCON22-Nir-Valtman-Extras-A-Journey-To-Protect-POS.zip 374.1 KB |
Phil Polstra - Updated/DEFCON-22-Phil-Polstra-Am-I-Being-Spied-On.pdf 344.2 KB |
David Wyde/DEFCON-22-David-Wyde-Client-Side-HTTP-Cookie-Security.pdf 343.6 KB |
Christopher Campbell/DEFCON-22-Christopher-Campbell-Path-Less-Traveled.pdf 341.6 KB |
Adam Wirth (SimonJ) - Updated/DEFCON-22-Adam-Wirth-SimonJ-Practical-Foxhunting-101.pdf 325.8 KB |
Nir Valtman - Updated/Nir Valtman - Extras.zip 325.6 KB |
Mike Larsen and Charlie Vedaa/DEFCON-22-Mike-Larsen-Charlie-Vedaa-Impostor-Polluting-Tor-Metadata.pdf 311.2 KB |
Heres, Etemadieh, Baker and Nielsen - Updated/DEFCON-22-Heres-Etemadieh-Baker-Nielsen-Hack-All-The-Things.pdf 295.1 KB |
Jim Denaro and Tod Beardsley - Updated/DEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit.pdf 276.4 KB |
David Dorsey - Updated/DEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP.pdf 271.4 KB |
Phil Polstra - Updated/DEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction.pdf 267.6 KB |
Lucas Morris and Michael McAtee/DEFCON-22-Lucas-Morris-Michael-McAtee-ShareEnum-We-Wrapped-Samba.pdf 239.2 KB |
Logan Lamb/DEFCON-22-Logan-Lamb-HOME-INSECURITY-NO-ALARMS-FALSE-ALARMS-AND-SIGINT-WP.pdf 236.6 KB |
Peter Teoh - Updated/DEFCON-22-Peter-Teoh-Data-Protection-101-Updated.pdf 230.7 KB |
Jesus Molina/DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room-WP.pdf 224.2 KB |
Paul Mcmillan/DEFCON-22-Paul-Mcmillan-Attacking-the-IOT-Using-timing-attacks.pdf 204.5 KB |
Richard Klafter and Eric Swanson/DEFCON-22-Richard-Klafter-and-Eric-Swanson-Check-Your-Fingerprints-Cloning-the-Strong-Set.pdf 198.2 KB |
Tim Mcguffin/DEFCON-22-Tim-Mcguffin-One-Man-Shop.pdf 186.2 KB |
Josh Corman and Nicholas Percoco - Updated/DEFCON-22-Josh-Corman-Nicholas-Percoco-Cavalry-Year-0.pdf 159.6 KB |
Paul Drapeau and Brent Dukes - Updated/Paul Drapeau and Brent Dukes - Extras.zip 144.0 KB |
David Litchfeild/DEFCON-22-David-Litchfeild-Oracle-Data-Redaction-is-Broken.pdf 134.0 KB |
Peter Teoh - Updated/DEFCON-22-Peter-Teoh-Data-Protection-101.pdf 131.5 KB |
Pierce and Loki/DEFCON-22-Pierce-Loki-NSA-PLAYSET-GSM.pdf 104.8 KB |
Paul Vixie/DEFCON-22-Paul-Vixie-WP.pdf 100.4 KB |
Paul Vixie/DEFCON-22-Paul-Vixie-2014-07-15-botnets.pdf 100.0 KB |
Viproy - Updated Extras.zip 74.4 KB |
Fatih Ozavci - Updated/Fatih Ozavci - Extras.zip 72.4 KB |
Shane Macaulay - Updated/Shane Macaulay - Extras.zip 67.8 KB |
David Mortman and The Fail Panel/DEFCON-22-Fail-Panel-Defcon-Comedy-Jam-VII.pdf 49.8 KB |
Phillip Young - Updated/Phillip Young - Extras.zip 37.9 KB |
David Wyde/David Wyde - Extras.zip 36.4 KB |
Alexandre Moneger - Updated/Alexandre Moneger - Extras.zip 34.3 KB |
Michael Ossman/DEFCON-22-Michael-Ossmann-CONGAFLOCK-schematic.pdf 27.9 KB |
Blake Self - Updated/Blake Self - Extras.zip 23.7 KB |
Gregory Pickett - Updated/Gregory Pickett - Extras.zip 14.9 KB |
Phil Polstra - Updated/.DS_Store 6.0 KB |
Richard Theime - Updated/.DS_Store 6.0 KB |
Nir Valtman - Updated/DEFCON-22-Nir-Valtman-Extras-Bug-Bounty-Programs-Evolution.zip 1.7 KB |
- Torrent indexed: 10 years
- Torrent updated: Thursday 30th of April 2015 06:30:01 PM
- Torrent hash: 2B9E6FC9BB172FD1B044B57DC5D5787A2519329E
- Torrent size: 1.2 GB
- Torrent category: other

Community - Add torrent to search results - Stats - DMCA - Removal Request - TOR - Contact
Comments