Search Torrents

DEF CON 22 presentations...


DEF CON 22 presentations Torrent content (File list)
Gene Bransfeild - Updated/DEFCON-22-Gene-Bransfield-Weaponizing-your-Pets-UPDATED.pdf 62.2 MB
Celine and Elie Bursztein - Updated/DEFCON-22-Celine-and-Elie-Bursztein-I-am-a-legend-UPDATED.pdf 49.3 MB
Will Schroeder/DEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf 48.8 MB
Dominic White and Ian de Villiers - Updated/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-onscreen-Updated.pdf 48.6 MB
Dhia Mahjoub, Andree Toonk, and Thibault Reuille - Updated/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf 44.7 MB
Ladar Levison and Stephen Watt - Updated/DEFCON-22-Levison-Watt-Dark-Mail-UPDATED.pdf 37.5 MB
Joe Fitzpatrick and Miles Crabill - Updated/DEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe-UPDATED.pdf 36.6 MB
Heres, Etemadieh, Baker and Nielsen - Updated/DEFCON-22-Heres-Etemadieh-Baker-Nielsen-Hack-All-The-Things-UPDATED.pdf 35.6 MB
Jesse Michael and Mickey Shkatov - Updated/Jesse Michael and Mickey Shkatov - Extras.zip 34.6 MB
Fatih Ozavci - Updated/DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones-UPDATED.pdf 33.8 MB
Colby Moore and Patrick Wardle - Updated/DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam-Updated.pdf 30.2 MB
Dominic White and Ian de Villiers - Updated/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdf 30.2 MB
Kenneth White and Matthew Green - Updated/DEFCON-22-Kenneth-White-and-Matthew-Green-The-Open-Crypto-Audit-Project-Updated.pdf 30.1 MB
Andrew Hunt - Updated/DEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise-UPDATED.pdf 26.3 MB
Brian Gorenc and Matt Molinyawe -Updated/Brian Gorenc and Matt Molinyawe - Extras.zip 26.1 MB
Glenn Wilkinson - Updated/DEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance-UPDATED.pdf 26.0 MB
Rmellendick and DaKahuna - Updated/DEFCON-22-Rmellendick-Dakahuna-RF-Penetration-Testing-Your-Air-Stinks-UPDATED.pdf 25.1 MB
Phil Polstra - Updated/DEFCON-22-Phil-Polstra-Am-I-Being-Spied-On-Updated.pdf 22.2 MB
Brian Gorenc and Matt Molinyawe -Updated/DEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly-UPDATED.pdf 19.8 MB
Zoz - Updated/DEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdf 19.2 MB
Deviant Ollam and Howard Payne/DEFCON-22-Deviant-Ollam-and-Howard-Payne-Elevator Hacking-From-the-Pit-to-the-Penthouse.pdf 18.5 MB
Andrew Hunt - Updated/DEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise.pdf 17.2 MB
Jim Denaro and Tod Beardsley - Updated/DEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit-UPDATED.pdf 17.0 MB
Zoz - Updated/DEFCON-22-Zoz-Dont-Fuck-It-Up.pdf 16.7 MB
Sarah Edwards/DEFCON-22-Sarah-Edwards-Reverse-Engineering-Mac-Malware.pdf 15.1 MB
Alijohn Ghassemlouei - Updated/DEFCON-22-Alijohn-Ghassemlouei-Anatomy-of-a-Pentest-Updated.pdf 14.7 MB
Grant Bugher - Updated/DEFCON-22-Grant-Bugher-Detecting-Bluetooth-Surveillance-Systems-Updated.pdf 14.0 MB
Kyle Kelley and Greg Anderson - Updated/DEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe.-Updated.pdf 11.7 MB
Bathurst, Rogers, Carey, and Clarke/DEFCON-22-Bathurst-Rogers-Carey-Clarke-PROPLANE.pdf 11.0 MB
Grant Bugher - Updated/DEFCON-22-Grant-Bugher-Detecting-Bluetooth-Surveillance-Systems.pdf 10.9 MB
Adrian Crenshaw - Updated/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf 10.8 MB
Josh Datko and Teddy Reed - Updated/DEFCON-22-Josh-Datko-Teddy-Reed-NSA-Playset-DIY-Hardware-Implant-over-l2c-UPDATED.pdf 10.3 MB
Aaron Bayles (AlxRogan) - Updated/DEFCON-22-Aaron-Bayles-Alxrogan-Protecting-SCADA-DC101.pdf 9.4 MB
Alex Pinto and Kyle Maxwell - Updated/DEFCON-22-Pinto-Maxwell-Secure-Because-Math-Updated.pdf 9.4 MB
Tim Strazzere and Jon Sawyer - Updated/DEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdf 8.9 MB
John Menerick - Updated/DEFCON-22-John-Menerick-Open-Source-Fairy-Dust-UPDATED.pdf 8.7 MB
Jake Kouns & Carsten Eiram - Updated/DEFCON-22-Kouns-Eiram-Screw-Becoming-A-Pentester-Bug-Bounty-Hunter-U{DATED.pdf 8.7 MB
Alex Pinto and Kyle Maxwell - Updated/DEFCON-22-Pinto-and-Maxwell-Measuring-the-IQ-of-your-threat-feeds-TIQtest-Updated.pdf 8.6 MB
Bulygin, Bazhaniul, Furtak, and Loucaides - Updated/DEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS.pdf 8.6 MB
Gregory Pickett - Updated/DEFCON-22-Gregory-Pickett-Abusing-Software-Defined-Networks-UPDATED.pdf 8.3 MB
Robert Rowley/DEFCON-22-Robert-Rowley-Detecting-Defending-Against-Surveillance-State.pdf 8.1 MB
Nir Valtman - Updated/DEFCON-22-Nir-Valtman-Bug-Bounty-Programs-Evolution.pdf 8.1 MB
Phillip Young - Updated/DEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes-Updated.pdf 7.9 MB
Colby Moore and Patrick Wardle - Updated/DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam.pdf 7.9 MB
Blake Self - Updated/DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdf 7.2 MB
Eric (XlogicX) Davisson and Ruben Alejandro (chap0)/DEFCON-22-Eric-Davisson-Ruben-Alejandro-Abuse-of-Blind-Automation-in-Security-Tools.pdf 6.8 MB
Ivan Petrov and Svetlana Gaivoronski - Updated/DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM.pdf 6.7 MB
Joe Fitzpatrick and Miles Crabill - Updated/DEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe.pdf 6.6 MB
Ivan Petrov and Svetlana Gaivoronski - Updated/DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM-Updated.pdf 6.3 MB
Ryan Kazanciyan and Matt Hastings - Updated/DEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks-UPDATED.pdf 6.3 MB
Wesley McGrew/Wesley McGrew - Extras.zip 6.2 MB
Rmellendick and DaKahuna - Updated/DEFCON-22-Rmellendick-Dakahuna-RF-Penetration-Testing-Your-Air-Stinks.pdf 6.2 MB
Jake Kouns & Carsten Eiram - Updated/DEFCON-22-Kouns-Eiram-Screw-Becoming-A-Pentester-Bug-Bounty-Hunter.pdf 5.9 MB
Phil Polstra - Updated/DEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction-Updated.pdf 5.7 MB
Joe Grand/DEFCON-22-Joe-Grand-Deconstructing-the-Circuit-Board-Sandwich.pdf 5.4 MB
Paul Drapeau and Brent Dukes - Updated/DEFCON-22-Drapeau-Dukes-Steganography-in-Commonly-Used-HF-Radio-Protocols-UPDATED.pdf 5.3 MB
Keren Elazari - Updated/DEFCON-22-Keren-Elazari-Empowering-Hackers-UPDATED.pdf 4.9 MB
Quaddi, R3plicant, and Hefley - Updated/DEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911-UPDATED.pdf 4.9 MB
Dustin Hoffman and Thomas Kinsey - Updated/DEFCON-22-Dustin-Hoffman-and-Thomas-Kinsey-What-the-Watchers-See-UPDATED.pdf 4.8 MB
Nir Valtman - Updated/DEFCON-22-Nir-Valtman-A-Journey-To-Protect-POS-UPDATED.pdf 4.7 MB
Maggie Jauregui - Updated/DEFCON-22-Maggie-Jauregui-Girl-Fault-Interrupted-Updated.pdf 4.7 MB
Zoltán Balázs - Updated/DEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds-UPDATED.pdf 4.0 MB
Felix Leder/DEFCON-22-Felix-Leder-NinjaTV.pdf 3.8 MB
Weston Hecker - Updated/DEFCON-22-Weston-Hecker-Burner-Phone-DDOS-UPDATED.pdf 3.8 MB
Paul Drapeau and Brent Dukes - Updated/DEFCON-22-Drapeau-Dukes-Steganography-in-Commonly-Used-HF-Radio-Protocols.pdf 3.7 MB
Elijah - Updated/DEFCON-22-Eijah-Saving-Cyberspace-by-Reinventing-File-Sharing-Updated.pdf 3.7 MB
Brady Bloxham - Updated/DEFCON-22-Brady-Bloxham-Windows-API-Abuse-UPDATED.pdf 3.7 MB
Paul Such (0x222)/DEFCON-22-Paul-Such-0x222-Playing-with-Car-Firmware.pdf 3.6 MB
Cesar Cerrudo - Updated/DEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems-UPDATED.pdf 3.4 MB
Keren Elazari - Updated/DEFCON-22-Keren-Elazari-Empowering-Hackers.pdf 3.4 MB
Adrian Crenshaw - Updated/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught.pdf 3.3 MB
Shahar Tal - Updated/DEFCON-22-Shahar-TaI-I-hunt-TR-069-admins-UPDATED.pdf 3.3 MB
Aaron Bayles (AlxRogan) - Updated/DEFCON-22-Aaron-Bayles-Alxrogan-Protecting-SCADA-DC101-Updated.pdf 2.9 MB
Jesse Michael and Mickey Shkatov - Updated/DEFCON-22-Jesse-Michael-Mickey-Shkatov-USB-for-All!!-UPDATED.pdf 2.8 MB
Bulygin, Bazhaniul, Furtak, and Loucaides - Updated/DEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS-UPDATED.pdf 2.7 MB
Dhia Mahjoub, Andree Toonk, and Thibault Reuille - Updated/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style.pdf 2.7 MB
Eric Smith and Joshua Perrymon - Updated/DEFCON-22-Smith-Perrymon-All-Your-Badges-Are-Belong-To-Us-UPDATED.pdf 2.6 MB
Michael Ossman/DEFCON-22-Michael-Ossmann-Pierce-Toorcamp.pdf 2.5 MB
Gene Bransfeild - Updated/DEFCON-22-Gene-Bransfield-Weaponizing-your-Pets.pdf 2.4 MB
Alexandre Moneger - Updated/DEFCON-22-Alex-Moneger-Stitching-numbers-Generating-ROP-payloads-from-in-memory-numbers-UPDATED.pdf 2.2 MB
Dominic White and Ian de Villiers - Updated/Dominic White and Ian de Villiers - Extras.zip 2.2 MB
Geoff Mcdonald - Updated/DEFCON-22-Geoff-Mcdonald-Meddle-Framework-UPDATED.pdf 2.1 MB
Alexandre Moneger - Updated/DEFCON-22-Alex-Moneger-Stitching-numbers-Generating-ROP-payloads-from-in-memory-numbers.pdf 2.1 MB
Richard Theime - Updated/DEFCON-22-Theime-Truth-Through-Fiction-Updated.pdf 2.0 MB
Mike Schrenk - Updated/DEFCON-22-Mike-Schrenk-Youre-Leaking-Trade-Secrets-UPDATED.pdf 2.0 MB
Phillip Young - Updated/DEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes.pdf 2.0 MB
Adam Wirth (SimonJ) - Updated/DEFCON-22-Adam-Wirth-SimonJ-Practical-Foxhunting-101-UPDATED.pdf 1.9 MB
John Menerick - Updated/DEFCON-22-John-Menerick-Open-Source-Fairy-Dust.pdf 1.8 MB
Ryan Kazanciyan and Matt Hastings - Updated/DEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks.pdf 1.8 MB
Logan Lamb/DEFCON-22-Logan-Lamb-HOME-INSECURITY-NO-ALARMS-FALSE-ALARMS-AND-SIGINT.pdf 1.8 MB
Lance Buttars (Nemus) - Updated/DEFCON-22-Lance-Buttars-Nemus-Intro-to-backdooring-OS-UPDATED.pdf 1.8 MB
Jay Healey - Updated/DEFCON-22-Jay-Healey-Saving-the-Internet-UPDATED.pdf 1.7 MB
Quaddi, R3plicant, and Hefley - Updated/DEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911.pdf 1.7 MB
Dominic White and Ian de Villiers - Updated/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven.pdf 1.7 MB
Luca Bruno and Mariano Graziano - Updated/DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass-Updated.pdf 1.6 MB
Shahar Tal - Updated/DEFCON-22-Shahar-TaI-I-hunt-TR-069-admins.pdf 1.6 MB
Corey Kallenberg - Updated/DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation-WP-UPDATED.pdf 1.6 MB
Corey Kallenberg - Updated/DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation.pdf 1.5 MB
Gregory Pickett - Updated/DEFCON-22-Gregory-Pickett-Abusing-Software-Defined-Networks.pdf 1.5 MB
Weston Hecker - Updated/DEFCON-22-Weston-Hecker-Burner-Phone-DDOS.pdf 1.4 MB
Zoltán Balázs - Updated/DEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds.pdf 1.4 MB
Elijah - Updated/DEFCON-22-Eijah-Saving-Cyberspace-by-Reinventing-File-Sharing.pdf 1.4 MB
Scott Erven and Shawn Merdinger - Updated/DEFCON-22-Scott-Erven-and-Shawn-Merdinger-Just-What-The-DR-Ordered-UPDATED.pdf 1.4 MB
Tess Schrodinger/DEFCON-22-Tess-Schrodinger-Raxacoricofallapatorius-With-Love-Case-Studies.pdf 1.3 MB
Glenn Wilkinson - Updated/DEFCON-22-Glenn-Wilkinson-GRW-WP.pdf 1.3 MB
Alex Zacharis and Nikolaos Tsagkarakis/DEFCON-22-Alex Zacharis-Nikolaos-Tsagkarakis-PoS-Attacking-the-Traveling-Salesman.pdf 1.2 MB
Holt, Smirnova, and Chua - Updated/DEFCON-22-Holt-Smirnova-Chua-Stolen-Data-Markets-Updated.pdf 1.1 MB
Cesar Cerrudo - Updated/DEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems.pdf 1.1 MB
Dhia Mahjoub, Andree Toonk, and Thibault Reuille - Updated/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-WP.pdf 1.0 MB
Josh Corman and Nicholas Percoco - Updated/DEFCON-22-Josh-Corman-Nicholas-Percoco-Cavalry-Year-0-UPDATED.pdf 1.0 MB
Corey Kallenberg - Updated/DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation-WP.pdf 1013.1 KB
Shane Macaulay - Updated/DEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode-UPDATED.pdf 999.1 KB
Alex Zacharis and Nikolaos Tsagkarakis/Alex Zacharis and Nikolaos Tsagkarakis - Extras.zip 989.3 KB
Ivan Petrov and Svetlana Gaivoronski - Updated/DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM.avi 967.3 KB
Jay Healey - Updated/DEFCON-22-Jay-Healey-Saving-the-Internet.pdf 963.0 KB
Luca Bruno and Mariano Graziano - Updated/DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass.pdf 962.8 KB
Chris Littlebury/DEFCON-22-Chris-Littlebury-Home-Alone-with-localhost.pdf 961.8 KB
Glenn Wilkinson - Updated/DEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance.pdf 949.3 KB
Fatih Ozavci - Updated/DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones.pdf 824.4 KB
Maggie Jauregui - Updated/DEFCON-22-Maggie-Jauregui-Girl-Fault-Interrupted.pdf 814.5 KB
Josh Datko and Teddy Reed - Updated/DEFCON-22-Josh-Datko-Teddy-Reed-NSA-Playset-DIY-Hardware-Implant-over-l2c.pdf 800.3 KB
Metacortex and Grifter/DEFCON-22-Metacortex-Grifter-Darkside-of-the-internet.pdf 761.3 KB
Andrew Hunt - Updated/DEFCON-22-Andrew-Hunt-MoCA-Overview-and-Security-Posture-WP.pdf 740.6 KB
Jesse Michael and Mickey Shkatov - Updated/DEFCON-22-Jesse-Michael-Mickey-Shkatov-USB-for-All!!.pdf 705.8 KB
Lance Buttars (Nemus) - Updated/DEFCON-22-Lance-Buttars-Nemus-Intro-to-backdooring-OS.pdf 693.7 KB
Shane Macaulay - Updated/DEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode.pdf 656.9 KB
Anton Sapozhnikov/DEFCON-22-Anton-Sapozhnikov-Acquire-Current-User-Hashes-Without-Admin-Privileges.pdf 597.9 KB
Geoff Mcdonald - Updated/DEFCON-22-Geoff-Mcdonald-Meddle-Framework.pdf 591.1 KB
Christopher Campbell/DEFCON-22-Christopher-Campbell-The-Secret-Life-of-Krbtgt.pdf 586.9 KB
Jesus Molina/DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room.pdf 559.6 KB
Wesley McGrew/DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware-WP.pdf 557.5 KB
Richard Theime - Updated/Extras.zip 511.7 KB
Blake Self - Updated/DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro.pdf 507.6 KB
Graham, McMillan, and Tentler/DEFCON-22-Graham-McMillan-Tentler-Masscaning-the-Internet.pdf 492.9 KB
Andrew Hunt - Updated/Andrew Hunt - Extras.zip 474.1 KB
Brian Gorenc and Matt Molinyawe -Updated/DEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly.pdf 469.6 KB
Wesley McGrew/DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware.pdf 455.2 KB
Anch/DEFCON-22-Anch-The-Monkey-In-the-Middle.pdf 446.8 KB
David Dorsey - Updated/DEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP-UPDATED.pdf 443.7 KB
Andrew Hunt - Updated/DEFCON-22-Andrew-Hunt-Raspberry-MoCA-an-Automated-Penetration-Platform-WP.pdf 442.7 KB
Kyle Kelley and Greg Anderson - Updated/DEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe.pdf 417.8 KB
Luca Bruno and Mariano Graziano - Updated/DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass-WP-UPDATED.pdf 388.1 KB
Nir Valtman - Updated/DEFCON22-Nir-Valtman-Extras-A-Journey-To-Protect-POS.zip 374.1 KB
Phil Polstra - Updated/DEFCON-22-Phil-Polstra-Am-I-Being-Spied-On.pdf 344.2 KB
David Wyde/DEFCON-22-David-Wyde-Client-Side-HTTP-Cookie-Security.pdf 343.6 KB
Christopher Campbell/DEFCON-22-Christopher-Campbell-Path-Less-Traveled.pdf 341.6 KB
Adam Wirth (SimonJ) - Updated/DEFCON-22-Adam-Wirth-SimonJ-Practical-Foxhunting-101.pdf 325.8 KB
Nir Valtman - Updated/Nir Valtman - Extras.zip 325.6 KB
Mike Larsen and Charlie Vedaa/DEFCON-22-Mike-Larsen-Charlie-Vedaa-Impostor-Polluting-Tor-Metadata.pdf 311.2 KB
Heres, Etemadieh, Baker and Nielsen - Updated/DEFCON-22-Heres-Etemadieh-Baker-Nielsen-Hack-All-The-Things.pdf 295.1 KB
Jim Denaro and Tod Beardsley - Updated/DEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit.pdf 276.4 KB
David Dorsey - Updated/DEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP.pdf 271.4 KB
Phil Polstra - Updated/DEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction.pdf 267.6 KB
Lucas Morris and Michael McAtee/DEFCON-22-Lucas-Morris-Michael-McAtee-ShareEnum-We-Wrapped-Samba.pdf 239.2 KB
Logan Lamb/DEFCON-22-Logan-Lamb-HOME-INSECURITY-NO-ALARMS-FALSE-ALARMS-AND-SIGINT-WP.pdf 236.6 KB
Peter Teoh - Updated/DEFCON-22-Peter-Teoh-Data-Protection-101-Updated.pdf 230.7 KB
Jesus Molina/DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room-WP.pdf 224.2 KB
Paul Mcmillan/DEFCON-22-Paul-Mcmillan-Attacking-the-IOT-Using-timing-attacks.pdf 204.5 KB
Richard Klafter and Eric Swanson/DEFCON-22-Richard-Klafter-and-Eric-Swanson-Check-Your-Fingerprints-Cloning-the-Strong-Set.pdf 198.2 KB
Tim Mcguffin/DEFCON-22-Tim-Mcguffin-One-Man-Shop.pdf 186.2 KB
Josh Corman and Nicholas Percoco - Updated/DEFCON-22-Josh-Corman-Nicholas-Percoco-Cavalry-Year-0.pdf 159.6 KB
Paul Drapeau and Brent Dukes - Updated/Paul Drapeau and Brent Dukes - Extras.zip 144.0 KB
David Litchfeild/DEFCON-22-David-Litchfeild-Oracle-Data-Redaction-is-Broken.pdf 134.0 KB
Peter Teoh - Updated/DEFCON-22-Peter-Teoh-Data-Protection-101.pdf 131.5 KB
Pierce and Loki/DEFCON-22-Pierce-Loki-NSA-PLAYSET-GSM.pdf 104.8 KB
Paul Vixie/DEFCON-22-Paul-Vixie-WP.pdf 100.4 KB
Paul Vixie/DEFCON-22-Paul-Vixie-2014-07-15-botnets.pdf 100.0 KB
Viproy - Updated Extras.zip 74.4 KB
Fatih Ozavci - Updated/Fatih Ozavci - Extras.zip 72.4 KB
Shane Macaulay - Updated/Shane Macaulay - Extras.zip 67.8 KB
David Mortman and The Fail Panel/DEFCON-22-Fail-Panel-Defcon-Comedy-Jam-VII.pdf 49.8 KB
Phillip Young - Updated/Phillip Young - Extras.zip 37.9 KB
David Wyde/David Wyde - Extras.zip 36.4 KB
Alexandre Moneger - Updated/Alexandre Moneger - Extras.zip 34.3 KB
Michael Ossman/DEFCON-22-Michael-Ossmann-CONGAFLOCK-schematic.pdf 27.9 KB
Blake Self - Updated/Blake Self - Extras.zip 23.7 KB
Gregory Pickett - Updated/Gregory Pickett - Extras.zip 14.9 KB
Phil Polstra - Updated/.DS_Store 6.0 KB
Richard Theime - Updated/.DS_Store 6.0 KB
Nir Valtman - Updated/DEFCON-22-Nir-Valtman-Extras-Bug-Bounty-Programs-Evolution.zip 1.7 KB



  • Torrent indexed: 10 years

  • Torrent updated: Thursday 30th of April 2015 06:30:01 PM
  • Torrent hash: 2B9E6FC9BB172FD1B044B57DC5D5787A2519329E

  • Torrent size: 1.2 GB

  • Torrent category: other




Comments



Report suspicious or fake torrent



Community - Add torrent to search results - Stats - DMCA - Removal Request - TOR - Contact
BTC: 13uHKcvKFUuJvkmX2XbDuxFHueDoqaeBSi