搜索
DEF CON 25 video and slides
磁力链接/BT种子名称
DEF CON 25 video and slides
磁力链接/BT种子简介
种子哈希:
640afbdcc2e7d2760a3a6410afe76ddfc8a6b317
文件大小:
15.53G
已经下载:
2367
次
下载速度:
极快
收录时间:
2018-02-21
最近下载:
2024-10-13
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:640AFBDCC2E7D2760A3A6410AFE76DDFC8A6B317
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
骚宝全
直播自慰
def
清洗
satin
paco
黑水路口交
目線中字
gvg-762
jufe-109
大唐诡事录
妖互操
ghosted
nds
carib-012318-589
骚妇直播
sivr-207
md0028
反差定制
老杀
blackedraw+2022.08.08.sightseeing.melody.marks.mp4
2 boys
新人登场▌小丫头▌
爱玩跳蛋
睡眠姦
被摸胸
白皙粉嫩
martin
灵笼
[rbk-]
文件列表
DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need - AMA with 20 years of DEF CON CTF.mp4
497.6 MB
DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.srt
45.7 kB
DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel- Meet The Feds.srt
96.6 kB
DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.mp4
190.0 MB
DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.srt
59.0 kB
DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.mp4
177.1 MB
DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.srt
38.3 kB
DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.mp4
122.7 MB
DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.srt
29.7 kB
DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on z OS.srt
63.6 kB
DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.mp4
195.4 MB
DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.mp4
143.7 MB
DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.srt
38.3 kB
DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.mp4
66.4 MB
DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.srt
26.3 kB
DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.mp4
64.2 MB
DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.srt
8.6 kB
DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.mp4
192.9 MB
DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.srt
53.6 kB
DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.mp4
209.6 MB
DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.srt
54.5 kB
DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set .mp4
177.4 MB
DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set .srt
63.4 kB
DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.mp4
143.0 MB
DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.srt
47.5 kB
DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.mp4
196.4 MB
DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward, TRUMPNUM steps back how can we tell if we're winning.srt
56.9 kB
DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.mp4
149.0 MB
DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.srt
35.0 kB
DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.mp4
159.2 MB
DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.srt
61.0 kB
DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.mp4
177.4 MB
DEF CON 25 Conference - Daniel Bohannon, Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.srt
62.6 kB
DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time .mp4
156.3 MB
DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time .srt
40.0 kB
DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.mp4
90.2 MB
DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.srt
27.3 kB
DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.mp4
68.7 MB
DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.srt
22.7 kB
DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.mp4
90.0 MB
DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.srt
24.1 kB
DEF CON 25 Conference - Dor Azouri - BITSInject.mp4
85.0 MB
DEF CON 25 Conference - Dor Azouri - BITSInject.srt
20.0 kB
DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.mp4
191.4 MB
DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.srt
50.1 kB
DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.mp4
121.5 MB
DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.srt
49.5 kB
DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.mp4
169.9 MB
DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.srt
59.9 kB
DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.mp4
194.7 MB
DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.srt
70.2 kB
DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.mp4
210.0 MB
DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.srt
56.5 kB
DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.mp4
162.5 MB
DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.srt
57.6 kB
DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.srt
39.0 kB
DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your named pipe.mp4
166.5 MB
DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.mp4
151.6 MB
DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.srt
47.3 kB
DEF CON 25 Conference - Hanno Bock - Abusing Certificate Transparency Logs.mp4
94.6 MB
DEF CON 25 Conference - Hanno Bock - Abusing Certificate Transparency Logs.srt
32.4 kB
DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.mp4
148.1 MB
DEF CON 25 Conference - Haoqi Shan, Jian Yuan - Man in the NFC.srt
33.0 kB
DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.mp4
497.5 MB
DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.srt
126.8 kB
DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.mp4
56.2 MB
DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.srt
22.9 kB
DEF CON 25 Conference - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.mp4
213.8 MB
DEF CON 25 Conference - Ilja van Sprundel - Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.srt
62.8 kB
DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.mp4
128.6 MB
DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.srt
55.8 kB
DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.mp4
154.3 MB
DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.srt
41.5 kB
DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.mp4
171.0 MB
DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.srt
54.1 kB
DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.mp4
105.1 MB
DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.srt
38.2 kB
DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.mp4
158.2 MB
DEF CON 25 Conference - Jason Hernandez and Sam Richards, Jerod MacDonald-Evoy - Tracking Spies in the Skies.srt
49.6 kB
DEF CON 25 Conference - Jason Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.mp4
102.6 MB
DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.mp4
226.2 MB
DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.srt
67.7 kB
DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.mp4
174.3 MB
DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.srt
49.4 kB
DEF CON 25 Conference - Joe Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.mp4
181.8 MB
DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.mp4
188.4 MB
DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.srt
53.3 kB
DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.mp4
181.5 MB
DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.srt
57.4 kB
DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks-.mp4
176.4 MB
DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks-.srt
50.7 kB
DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.mp4
78.3 MB
DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.srt
24.7 kB
DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.mp4
98.8 MB
DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.srt
34.4 kB
DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.mp4
162.1 MB
DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL, A Modular Malware Implant Framework.srt
49.1 kB
DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.srt
34.5 kB
DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.srt
60.8 kB
DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.mp4
56.7 MB
DEF CON 25 Conference - K2 - UnFucking Forensics - Active - Passive memory hacking - debugging.srt
17.2 kB
DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.mp4
170.5 MB
DEF CON 25 Conference - Konstantinos Karagiannis - Hacking Smart Contracts.srt
52.1 kB
DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.mp4
95.4 MB
DEF CON 25 Conference - Lee Holmes - Get-$pwnd- Attacking Battle-Hardened Windows Server.srt
27.0 kB
DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.mp4
182.2 MB
DEF CON 25 Conference - Luke Young - There’s no place like 127001 - Achieving reliable DNS rebinding in modern browsers.srt
49.9 kB
DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics and Same Exploits.mp4
159.4 MB
DEF CON 25 Conference - Manfred - Twenty Years of MMORPG Hacking- Better Graphics, Same Exploits.srt
45.3 kB
DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.mp4
181.2 MB
DEF CON 25 Conference - Marc Newlin and Logan Lamb and Chris Grayson - CableTap- Wirelessly Tapping Your Home Network.srt
58.7 kB
DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.mp4
172.7 MB
DEF CON 25 Conference - Marina Simakov and Igal Gofman - Gaining persistency by abusing advanced authentication mechanisms.srt
48.9 kB
DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.mp4
124.3 MB
DEF CON 25 Conference - Mark Williams and Rob Stanley - If You Give a Mouse a Microchip.srt
35.6 kB
DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.mp4
182.5 MB
DEF CON 25 Conference - Matt Joyce - Amateur Digital Archeology.srt
62.7 kB
DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.mp4
143.6 MB
DEF CON 25 Conference - Matt Knight - Radio Exploitation 101.srt
49.7 kB
DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.mp4
143.0 MB
DEF CON 25 Conference - Matt Suiche - Porosity- A Decompiler For Blockchain-Based Smart Contracts Bytecode.srt
39.7 kB
DEF CON 25 Conference - Matt Wixey - See no evil and hear no evil - Hacking invisibly and silently with light and sound.mp4
192.3 MB
DEF CON 25 Conference - Matt Wixey - See no evil, hear no evil - Hacking invisibly and silently with light and sound.srt
51.0 kB
DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.mp4
162.5 MB
DEF CON 25 Conference - Max Bazaliy - Jailbreaking Apple Watch.srt
38.7 kB
DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.mp4
132.6 MB
DEF CON 25 Conference - Mickey Shkatov and Jesse Michael and Oleksandr Bazhaniuk - Driving down the rabbit hole.srt
39.4 kB
DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.mp4
85.9 MB
DEF CON 25 Conference - Mikhail Sosonkin - Hacking travel routers like it's 1999.srt
23.8 kB
DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS iOS Kernel Debugging and Heap Feng Shui.srt
23.7 kB
DEF CON 25 Conference - Min Zheng and Xiangyu Liu - macOS-iOS Kernel Debugging and Heap Feng Shui.mp4
114.6 MB
DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.mp4
131.7 MB
DEF CON 25 Conference - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level.srt
37.2 kB
DEF CON 25 Conference - Mr. Sean Kanuck - Hacking Democracy- A Socratic Dialogue.srt
54.7 kB
DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.mp4
123.9 MB
DEF CON 25 Conference - Nathan Seidle - Open Source Safe Cracking Robots - Combinations Under 1 Hour.srt
32.4 kB
DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.mp4
145.4 MB
DEF CON 25 Conference - Nick Cano - XenoScan- Scanning Memory Like a Boss.srt
49.4 kB
DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.mp4
60.7 MB
DEF CON 25 Conference - Octane - Untrustworthy Hardware and How to Fix It.srt
26.4 kB
DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.mp4
164.1 MB
DEF CON 25 Conference - Omar Eissa - Attacking Autonomic Networks.srt
40.2 kB
DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.mp4
165.1 MB
DEF CON 25 Conference - Orange Tsai - A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.srt
33.5 kB
DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.mp4
129.9 MB
DEF CON 25 Conference - Patrick DeSantis - From Box to Backdoor.srt
38.1 kB
DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers; on macOS, it's all broken!.srt
60.9 kB
DEF CON 25 Conference - Patrick Wardle - Death By 1000 Installers_ on macOS and it's all broken!.mp4
171.5 MB
DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.mp4
90.1 MB
DEF CON 25 Conference - Patrick Wardle - Offensive Malware Analysis- Dissecting OSX - FruitFly.srt
28.9 kB
DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.mp4
79.0 MB
DEF CON 25 Conference - Peyton Engel - Learning about Government Surveillance Software You Can't Ever See.srt
26.8 kB
DEF CON 25 Conference - Philip Tully and Michael T Raggo - A Picture is Worth a Thousand Words and Literally.mp4
163.7 MB
DEF CON 25 Conference - Philip Tully and Michael T. Raggo - A Picture is Worth a Thousand Words, Literally.srt
61.0 kB
DEF CON 25 Conference - Plore - Popping a Smart Gun.mp4
116.0 MB
DEF CON 25 Conference - Plore - Popping a Smart Gun.srt
50.3 kB
DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.mp4
112.0 MB
DEF CON 25 Conference - Professor Plum - Digital Vengeance- Exploiting the Most Notorious C&C Toolkits.srt
45.3 kB
DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.mp4
84.7 MB
DEF CON 25 Conference - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks.srt
26.5 kB
DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back - 212.srt
58.4 kB
DEF CON 25 Conference - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back.mp4
171.6 MB
DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.mp4
164.8 MB
DEF CON 25 Conference - Roger Dingledine - Next-Generation Tor Onion Services.srt
59.3 kB
DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.mp4
71.8 MB
DEF CON 25 Conference - Romain Coltel and Yves Le Provost - WSUSpendu- How to hang WSUS clients.srt
17.0 kB
DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.mp4
103.4 MB
DEF CON 25 Conference - Ryan Baxendale - Microservices and FaaS for Offensive Security.srt
28.5 kB
DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.mp4
194.8 MB
DEF CON 25 Conference - Saif El-Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects.srt
51.8 kB
DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.mp4
70.1 MB
DEF CON 25 Conference - Salvador Mendoza - Exploiting 0ld Mag-stripe information with New technology.srt
16.1 kB
DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.mp4
167.3 MB
DEF CON 25 Conference - Sarah Zatko - CITL and the Digital Standard - A Year Later.srt
42.0 kB
DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.mp4
168.2 MB
DEF CON 25 Conference - Scott Behrens and Jeremy Heffner - Starting the Avalanche - Application DoS In Microservice Architectures.srt
57.5 kB
DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.mp4
139.1 MB
DEF CON 25 Conference - Sean Dillon and Zach Harding - Koadic C3 - Windows COM Command & Control Framework.srt
50.2 kB
DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.mp4
164.9 MB
DEF CON 25 Conference - Snide Owen - Phone system testing and other fun tricks.srt
45.5 kB
DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.mp4
155.8 MB
DEF CON 25 Conference - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build system.srt
51.8 kB
DEF CON 25 Conference - Steinthor Bjarnason and Jason Jones - The call is coming from inside the house.mp4
130.6 MB
DEF CON 25 Conference - Steinthor Bjarnason, Jason Jones - The call is coming from inside the house.srt
40.8 kB
DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.mp4
119.6 MB
DEF CON 25 Conference - Stephan Huber and Siegfried Rasthofer - Bypassing Android Password Manager Without Root.srt
46.6 kB
DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.mp4
172.2 MB
DEF CON 25 Conference - Svea Owen and Andreas Dewes - Dark Data.srt
41.2 kB
DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.mp4
170.5 MB
DEF CON 25 Conference - Tess Schrodinger - Total Recall- Implanting Passwords in Cognitive Memory.srt
45.8 kB
DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.mp4
67.2 MB
DEF CON 25 Conference - The Dark Tangent - Welcome to DEF CON 25.srt
18.2 kB
DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.mp4
366.4 MB
DEF CON 25 Conference - The Dark Tangent and Def Con Goons - DEF CON Closing Ceremonies.srt
85.7 kB
DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.mp4
186.7 MB
DEF CON 25 Conference - Thomas Mathew and Dhia Mahjoub - Malicious CDNs.srt
57.1 kB
DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.mp4
137.7 MB
DEF CON 25 Conference - Tomer Cohen - Game of Chromes- Owning the Web with Zombie Chrome Extensions.srt
30.1 kB
DEF CON 25 Conference - Trey Forgety - Inside the Meet Desai Attack - Defending Distributed Targets from Distributed Attacks.mp4
161.4 MB
DEF CON 25 Conference - Trey Forgety - Inside the “Meet Desai” Attack - Defending Distributed Targets from Distributed Attacks.srt
56.0 kB
DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.mp4
143.6 MB
DEF CON 25 Conference - trixr4skids - DOOMed Point of Sale Systems.srt
51.0 kB
DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.mp4
89.2 MB
DEF CON 25 Conference - Vasilios Mavroudis and Dan Cvrcek - Trojan-tolerant Hardware & Supply Chain Security in Practice.srt
41.6 kB
DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.mp4
133.7 MB
DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need - AMA with 20 years of DEF CON CTF.srt
163.4 kB
DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.mp4
163.6 MB
DEF CON 25 Conference - Weston Hecker - Opt Out or Deauth Trying !- Anti-Tracking Bots Radios and Keystroke Injection.srt
54.8 kB
DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick and Tick and Tick.Boom You're Dead - Tech and the FTC.mp4
184.6 MB
DEF CON 25 Conference - Whitney Merrill and Terrell McSweeny - Tick, Tick, Tick.Boom You're Dead - Tech and the FTC.srt
54.7 kB
DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.mp4
78.9 MB
DEF CON 25 Conference - William Knowles - Persisting with Microsoft Office- Abusing Extensibility Options.srt
24.4 kB
DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.mp4
197.9 MB
DEF CON 25 Conference - XlogicX - Assembly Language is Too High Level.srt
62.0 kB
DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.mp4
203.3 MB
DEF CON 25 Conference - Yan Shoshitaishvili - 25 Years of Program Analysis.srt
55.1 kB
DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.mp4
158.1 MB
DEF CON 25 Conference - Yuwue Zheng and Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFB.srt
28.0 kB
DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.mp4
179.3 MB
DEF CON 25 Conference - Zenofex and 0x00string and CJ_000 and Maximus64 - All Your Things Are Belong To Us.srt
70.0 kB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>