Dimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf
71.01MB
DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf
1.87MB
DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf
1.64MB
DEFCON-25-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation-UPDATED.pdf
5.53MB
DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf
2.16MB
Dor Azouri/DEFCON-25-Dor-Azouri-BITSInject.pdf
827.94KB
Dor Azouri/DEFCON-25-Dor-Azouri-BITSInject-WP.pdf
1.46MB
DEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf
6.14MB
DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware-UPDATED.pdf
3.33MB
Morten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf
1.97MB
Morten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf
1.11MB
DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf
2.97MB
DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf
2.55MB
DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security-UPDATED.pdf
1.38MB
DEFCON-25-Professor-Plum-Digital-Vengeance-Exploiting-Notorious-Toolkits-UPDATED.pdf
6.9MB
Matt Knight and Marc Newlin - UPDATED/DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-UPDATED.pdf
25.59MB
Matt Knight and Marc Newlin - UPDATED/DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP-UPDATED.pdf
124.99KB
DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf
249.99KB
DEFCON-25-Matt-Joyce-Amateur-Digital-Archeology-UPDATED.pdf
57.18MB
DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist-UPDATED.pdf
5.5MB
DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf
5.49MB
DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools-UPDATED.pdf
12.41MB
DEFCON-25-Plore-Popping-a-Smart-Gun-UPDATED.pdf
4.21MB
DEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf
2.16MB
DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf
5.07MB
DEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf
4.26MB
DEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf
1.84MB
DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA-UPDATED.pdf
16.72MB
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-UPDATED.pdf
14.83MB
DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf
1.89MB
Mark Newlin Logan Lamb and Christopher Grayson/DEFCON-25-Newlin-Lamb-Grayson-CableTap-Wirelessly-Tapping-Your-Home-Network.pdf
3.72MB
DEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf
4.89MB
Matt Suiche/DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-WP.pdf
310.26KB
Matt Suiche/DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts.pdf
6.06MB
DEFCON-25-Patrick-Wardle-Death-by-1000-Installers-on-MacOS-UPDATED.pdf
29.3MB
DEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf
6.69MB
DEFCON-25-William-Knowles-Persisting-With-Microsoft-Office.pdf
2.78MB
DEFCON-25-Svea-Eckert-Andreas-Dewes-Dark-Data.pdf
6.22MB
DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf
5.95MB
DEFCON-25-Tess-Schrodinger-Total-Recall.pdf
4.95MB
Tomer Cohen/DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf
2.03MB
Tomer Cohen/DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf
20.65MB
DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf
5.99MB
DEFCON-25-0ctane-Untrustworthy-Hardware.pdf
2.53MB
Steinthor Bjarnason and Jason Jones/DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-WP.pdf
164.74KB
Steinthor Bjarnason and Jason Jones/DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House.pdf
6.3MB
Cheng Lei/DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus.pdf
1.65MB
Cheng Lei/DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus-WP.pdf
1.2MB
DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies-UPDATED.pdf
9.49MB
DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts-UPDATED.pdf
1.66MB
DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks.pdf
2.39MB
DEFCON-25-trixr4skids-DOOMed-Point-of-Sale-Systems-UPDATED.pdf
21.68MB
DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf
2.23MB
DEFCON-25-Alvaro-Munoz-JSON-attacks.pdf
1.77MB
DEFCON-25-Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf
290.1KB
Matt Knight and Marc Newlin/DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation.pdf
25.08MB
Matt Knight and Marc Newlin/DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP.pdf
124.73KB
DEFCON-25-Salvador-Mendoza-Exploiting-0ld-Magstripe-Info-with-New-Technology.pdf
5.21MB
DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf
4.16MB
DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil.pdf
5.98MB
DEFCON-25-spaceB0x-Exploiting-Continuous-Integration-UPDATED.pdf
2.65MB
DEFCON-25-Mickey-Jesse-and-Oleksander-Driving-Down-the-Rabbit-Hole-UPDATED.pdf
12.29MB
DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre-UPDATED.pdf
42.61MB
Denton Gentry/DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-WP.pdf
512.98KB
Denton Gentry/DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi.pdf
464.19KB
DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android-UPDATED.pdf
899.73KB
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf
20.65MB
DEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf
2.98MB
DEFCON-25-FuzzyNop-and-Ceyx-MEATPISTOL-A-Modular-Malware-Implant-Framework-UPDATED.pdf
4.59MB
DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks-UPDATED.pdf
2.6MB
DEFCON-25-zerosum0x0-alephnaught-Koadic-C3.pdf
1.89MB
DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-UPDATED.pdf
10.06MB
DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf
2.72MB
DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-UPDATED.pdf
1.93MB
DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf
5.81MB
DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation-UPDATED.pdf
3.64MB
DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs-UPDATED.pdf
851.19KB
DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA.pdf
5.03MB
DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch.pdf
1.27MB
DEFCON-25-K2-Un-Fucking-Forensics-UPDATED.pdf
1.7MB
DEFCON-25-Joe-Rozner-Wiping-Out-CSRF-UPDATED.pdf
130.26KB
DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation-UPDATED.pdf
6.92MB
DEFCON-25-Panel-Corman-and-Congressmen-DC-to-DEFCON-UPDATED.pdf
6MB
DEFCON-25-Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf
10.6MB
Phillip Tully and Michael Raggo/DEFCON-25-Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally-WP.pdf
386.39KB
Phillip Tully and Michael Raggo/DEFCON-25-Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally.pdf
3.64MB
DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf
2.39MB
Josh Pitts/Josh Pitts - Extras/parser-output/winVista/output.json
4.38MB
Josh Pitts/Josh Pitts - Extras/parser-output/win8/output.json
9.16MB
Josh Pitts/Josh Pitts - Extras/parser-output/win10/output.json
17.5MB
Josh Pitts/Josh Pitts - Extras/parser-output/win7/output.json
6.25MB
Josh Pitts/Josh Pitts - Extras/parser-output/winXP/output.json
865.92KB
Josh Pitts/Josh Pitts - Extras/README.txt
71B
Josh Pitts/Josh Pitts - Extras/fido.py
169.55KB
Josh Pitts/DEFCON-25-Josh-Pitts-Teaching-Old-Shellcode-New-Tricks.pdf
5.42MB
DEFCON-25-Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf
69.21KB
DEFCON-25-Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf
2.33MB
Duncan Woodbury and Nicholas Haltmeyer/DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles.pdf
4.48MB
Duncan Woodbury and Nicholas Haltmeyer/DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-WP.pdf
586.36KB
DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent.pdf
2.19MB
DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time-UPDATED.pdf
4.54MB
DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf
6.49MB
DEFCON-25-Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf
799.3KB
DEFCON-25-XlogicX-Assembly-Language-Is-Too-High-Level.pdf
7.49MB
DEFCON-25-Plore-Popping-a-Smart-Gun.pdf
4.11MB
DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots-UPDATED.pdf
6.71MB
DEFCON-25-Zardus-25-Years-of-Program-Analysis-UPDATED.pdf
3.7MB
DEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf
3.17MB
DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-UPDATED.pdf
507.44KB
DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf
2.39MB
DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns.pdf
2.03MB
DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks-UPDATED.pdf
3.39MB
DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf
2.51MB
DEFCON-25-Jon-Medina-Where-are-all-the-SDN-Talks-UPDATED.pdf
4.69MB
DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf
6.01MB
DEFCON-25-Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally-UPDATED.pdf
5.96MB
DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes-UPDATED.pdf
6.67MB
DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf
4.15MB
DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks-UPDATED.pdf
9.44MB
DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe.pdf
3.99MB
DEFCON-25-Brown-and-Latimer-Game-of-Drones-Drone-Defense-Market-UPDATED.pdf
29.95MB
DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly-UPDATED..pdf
15.37MB
DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud-UPDATED.pdf
2.39MB
DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf
4.8MB
5A1F/DEFCON-25-5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects-WP.pdf
6.15MB
5A1F/DEFCON-25-5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects.pdf
10.72MB
DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf
8.38MB
Cooper Quintin and Kashmir Hill - UPDATED/DEFCON-25-Cooper-Quintin-The-Pregnancy-Panopticon-WP-UPDATED.pdf
631.26KB
Cooper Quintin and Kashmir Hill - UPDATED/DEFCON-25-Cooper-Quintin-and-Kashmir-Hill-The-Internet-Already-Knows-Im-Pregnant-UPDATED.pdf
3.88MB
DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community-UPDATED.pdf
26.77MB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kcmd/__init__.pyc
129B
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kcmd/cmdlook.py
1.32KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kcmd/__init__.py
0B
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kcmd/cmdservice.py
11.93KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/config/client.yml
1.81KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/config/server.yml
1.85KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/keys/server.pem
2.98KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/README.md
155B
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/logs/octohook_server.log
8.84KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/logs/octohook_client.log
39.86KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/ktasks/__init__.py
0B
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/ktasks/gtasks.py
2.36KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/doc/requirements.txt
547B
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/klib/ghlib.pyc
3.92KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/klib/__init__.py
0B
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/klib/__init__.pyc
129B
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/klib/configuration.py
1.25KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/klib/ghlib.py
3.58KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/octohook.py
4.06KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kweb/webservice.pyc
3.82KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kweb/webrouter.py
1.04KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kweb/webservice.py
3.73KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kweb/gitcommander.py
7.84KB
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kweb/__init__.pyc
129B
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/kweb/__init__.py
0B
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/utils/cr_cert.sh
95B
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/templates/putlocal.tmpl
151B
Dimitry Snezhkov/Dimitry Snezhkov - Extras/octohook-master/templates/execlocal.tmpl
152B
DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf
1.46MB
DEFCON-25-Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf
616.52KB
DEFCON-25-Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf
6.86MB
DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI-UPDATED.pdf
4.9MB
DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf
911.57KB
DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging-UPDATED.pdf
5.33MB
DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery-UPDATED.pdf
2.8MB
DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil-UPDATED.pdf
5.89MB
DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent-UPDATED.pdf
2.46MB
DEFCON-25-Scott-Behrens-and-Jeremy-Heffner-Starting-The-Avalanche-Application-DoS-In-Microservice-Architectures.pdf
2.04MB
DEFCON-25-Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf
4.16MB
DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms-UPDATED.pdf
2.98MB
DEFCON-25-Macpherson-and-Temmingh-Finding-Useful-info-with-Maltego-UPDATED.pdf
38.91MB
DEFCON-25-DEFCON-101-The-Panel-UPDATED.pdf
6.33MB
DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services-UPDATED.pdf
2.41MB
DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf
4.45MB
DEFCON-25-Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf
6.81MB
Itzik Kotler and Amit Klein/DEFCON-25-Itzik-Kotler-and-Amit-Klein-The-Adventures-of-AV-and-the-Leaky-Sandbox-WP.pdf
1.32MB
Itzik Kotler and Amit Klein/DEFCON-25-Itzik-Kotler-and-Amit-Klein-The-Adventures-of-AV-and-the-Leaky-Sandbox.pdf
7.08MB
DEFCON-25-r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf
3.21MB
DEFCON-25-spaceB0x-Exploiting-Continuous-Integration.pdf
1.99MB
DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit-UPDATED.pdf
2.82MB
Alvaro Munoz and Oleksandr Mirosh - UPDATED/DEFCON-25-Alvaro-Munoz-and-Oleksandr-Mirosh-JSON-Attacks-UPDATED.pdf
18.8MB
Alvaro Munoz and Oleksandr Mirosh - UPDATED/DEFCON-25-Alvaro-Munoz-JSON-attacks-WP-UPDATED.pdf
664.98KB
DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip-UPDATED.pdf
5.83MB
DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf
4.6MB
DEFCON-25-Joe-Rozner-Wiping-Out-CSRF.pdf
131.43KB
DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns-UPDATED.pdf
2.16MB
DEFCON-25-Closing-Slides.pdf
8.79MB
DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe-UPDATED.pdf
4.13MB
DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools.pdf
4.45MB
Romain Coltel and Yves Le Provost/DEFCON-25-Coltel-LeProvost-WSUSpendu-How-To-Hang-Its-Clients-WP.pdf
1.03MB
Romain Coltel and Yves Le Provost/DEFCON-25-Coltel-LeProvost-WSUSpendu-How-To-Hang-Its-Clients.pdf
2.22MB
DEFCON-25-Josh-Pitts-Teaching-Old-Shellcode-New-Tricks-UPDATED.pdf
3.46MB
DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch-UPDATED.pdf
4.81MB
DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999-UPDATED.pdf
4.43MB
DEFCON-25-Cory-Doctorow-Steps-Forward-Steps-Back-How-Can-We-Tell-If-We-Are-Winning-UPDATED.pdf
9.63MB
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf
2.03MB
DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-UPDATED.pdf
2.94MB
DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-UPDATED.pdf
6.66MB