defcon-talks
File List
- 54816-high_intensity_deconstruction_chronicles_of_a_cryptographic_heist.mp4 913.1 MB
- 54817-listen_to_the_whispers_web_timing_attacks_that_actually_work.mp4 778.3 MB
- 54853-the_pwnie_awards-partial.mp4 763.4 MB
- 54846-exploiting_bluetooth_-_from_your_car_to_the_bank_account.mp4 592.6 MB
- 54828-def_con_unplugged_cocktails_and_cyber_with_jeff_and_jen.mp4 581.3 MB
- 54871-eradicating_hepatitis_c_with_bioterrorism.mp4 579.2 MB
- 54857-the_rise_and_fall_of_binary_exploitation.mp4 574.2 MB
- 54844-bricked_and_abandoned_how_to_keep_the_iot_from_becoming_an_internet_of_trash.mp4 572.6 MB
- 54843-breaking_secure_web_gateways_swg_for_fun_and_profit.mp4 569.4 MB
- 54888-iconv_set_the_charset_to_rce_exploiting_the_glibc_to_hack_the_php_engine-partial.mp4 568.5 MB
- 54902-driverjack_turning_ntfs_and_emulated_read-only_filesystems_in_an_infection_and_persistence_vector.mp4 565.7 MB
- 54830-the_way_to_android_root_exploiting_your_gpu_on_smartphone.mp4 564.4 MB
- 54861-disenshittify_or_die_how_hackers_can_seize_the_means_of_computation_and_build_a_new_good_internet_that_is_hardened_against_our_asshole_bosses_insatiable_horniness_for_enshittification.-partial.mp4 562.9 MB
- 54865-fireside_chat_with_jay_healey_and_national_cyber_director_harry_coker_jr..mp4 557.8 MB
- 54863-amd_sinkclose_universal_ring_-2_privilege_escalation-partial.mp4 556.4 MB
- 54829-optical_espionage_using_lasers_to_hear_keystrokes_through_glass_windows.mp4 553.6 MB
- 54909-your_ai_assistant_has_a_big_mouth_a_new_side-channel_attack.mp4 551.8 MB
- 54914-abusing_legacy_railroad_signaling_systems-partial.mp4 548.9 MB
- 54845-one_for_all_and_all_for_whad_wireless_shenanigans_made_easy.mp4 547.3 MB
- 54835-dc101_panel.mp4 544.7 MB
- 54889-nano-enigma_uncovering_the_secrets_within_efuse_memories-partial.mp4 542.1 MB
- 54884-def_con_academy_cultivating_m4d_sk1llz_in_the_def_con_community.mp4 536.6 MB
- 54823-defeating_edr_evading_malware_with_memory_forensics.mp4 529.1 MB
- 54885-watchers_being_watched_exploiting_the_surveillance_system_and_its_supply_chain.mp4 527.9 MB
- 54825-sshamble_unexpected_exposures_in_the_secure_shell-partial.mp4 525.7 MB
- 54874-troll_trapping_through_tas_tools_-_exposing_speedrunning_cheaters.mp4 522.5 MB
- 54852-reverse_engineering_micropython_frozen_modules_data_structures_reconstruction_and_reading_bytecode.mp4 522.2 MB
- 54896-changing_global_threat_landscape_with_rob_joyce_and_dark_tangent.mp4 516.8 MB
- 54819-fireside_chat_with_dnsa_anne_neuberger-partial.mp4 513.8 MB
- 54882-secrets_and_shadows_leveraging_big_data_for_vulnerability_discovery_at_scale.mp4 513.2 MB
- 54834-android_app_usage_and_cell_tower_location_private._sensitive._available_to_anyone.mp4 509.6 MB
- 54833-abusing_windows_hello_without_a_severed_hand.mp4 508.8 MB
- 54841-leveraging_private_apns_for_mobile_network_traffic_analysis.mp4 506.6 MB
- 54839-sql_injection_isnt_dead_smuggling_queries_at_the_protocol_level-partial.mp4 506.1 MB
- 54854-gotta_cache_‘em_all_bending_the_rules_of_web_cache_exploitation-partial.mp4 504.6 MB
- 54858-quickshell_sharing_is_caring_about_an_rce_attack_chain_on_quick_share-partial.mp4 504.1 MB
- 54876-exploiting_the_unexploitable_insights_from_the_kibana_bug_bounty-partial.mp4 502.8 MB
- 54838-outlook_unleashing_rce_chaos_cve-2024-30103_and_cve-2024-38021.mp4 500.0 MB
- 54870-discovering_and_exploiting_local_attacks_against_the_1password_macos_desktop_application.mp4 499.6 MB
- 54856-shim_me_what_you_got_-_manipulating_shim_and_office_for_code_injection.mp4 496.2 MB
- 54862-grand_theft_actions_abusing_self-hosted_github_runners_at_scale-partial.mp4 495.2 MB
- 54899-the_hack_the_crash_and_two_smoking_barrels._and_all_the_times_i_almost_killed_an_engineer..mp4 493.7 MB
- 54814-open_sesame_-_or_how_vulnerable_is_your_stuff_in_electronic_lockers.mp4 491.6 MB
- 54891-aws_cloudquarry_digging_for_secrets_in_public_amis.mp4 490.9 MB
- 54822-kicking_in_the_door_to_the_cloud_exploiting_cloud_provider_vulnerabilities_for_initial_access.mp4 485.7 MB
- 54898-dragon_slayingguide_bug_hunting_in_vmware_device_virtualization.mp4 485.5 MB
- 54879-unsaflok_hacking_millions_of_hotel_locks.mp4 482.9 MB
- 54877-measuring_the_tor_network.mp4 482.7 MB
- 54883-breaking_the_beam_exploiting_vsat_satellite_modems_from_the_earths_surface.mp4 482.5 MB
- 54826-digital_emblems_when_markings_are_required_under_international_law_but_you_dont_have_a_rattle-can_handy.mp4 480.4 MB
- 54913-incubated_machine_learning_exploits_backdooring_ml_pipelines_using_input-handling_bugs-partial.mp4 469.2 MB
- 54908-redefining_v2g_-_how_to_use_your_vehicle_as_a_game_controller.mp4 469.1 MB
- 54818-making_the_def_con_32_badge.mp4 462.6 MB
- 54831-breaching_aws_accounts_through_shadow_resources.mp4 461.5 MB
- 54878-hookchain_a_new_perspective_for_bypassing_edr_solutions-partial.mp4 448.2 MB
- 54895-windows_downdate_downgrade_attacks_using_windows_updates.mp4 446.6 MB
- 54892-splitting_the_email_atom_exploiting_parsers_to_bypass_access_controls.mp4 434.7 MB
- 54869-ntlm_-_the_last_ride-partial.mp4 429.0 MB
- 54873-ace_up_the_sleeve_from_getting_jtag_on_the_iphone_15_to_hacking_into_apples_new_usb-c_controller.mp4 427.7 MB
- 54867-oh-my-dc_abusing_oidc_all_the_way_to_your_cloud-partial.mp4 423.9 MB
- 54855-smishing_smackdown_unraveling_the_threads_of_usps_smishing_and_fighting_back.mp4 420.3 MB
- 54868-behind_enemy_lines_engaging_and_disrupting_ransomware_web_panels-partial.mp4 411.0 MB
- 54837-taming_the_beast_inside_the_llama_3_red_team_process.mp4 407.2 MB
- 54820-on_your_oceans_11_team_im_the_ai_guy_technically_girl-partial.mp4 405.8 MB
- 54859-sudos_and_sudonts_-_peering_inside_sudo_for_windows.mp4 402.2 MB
- 54864-the_secret_life_of_a_rogue_device_-_lost_it_assets_on_the_public_marketplace.mp4 381.2 MB
- 54851-mutual_authentication_is_optional-partial.mp4 321.3 MB
- 54824-if_existing_cyber_vulnerabilities_magically_disappeared_overnight_what_would_be_next.mp4 300.3 MB
- 54840-atomic_honeypot_a_mysql_honeypot_that_drops_shells-partial.mp4 300.2 MB
- 56208-def_con_franklin_project.mp4 282.2 MB
- 54887-techniques_for_creating_process_injection_attacks_with_advanced_return-oriented_programming.mp4 275.5 MB
- 54850-laundering_money.mp4 248.8 MB
- 54880-compromising_an_electronic_logging_device_and_creating_a_truck2truck_worm.mp4 230.2 MB
- 54894-unlocking_the_gates_hacking_a_secure_industrial_remote_access_solution.mp4 223.6 MB
- 54813-no_symbols_when_reversing_no_problem_bring_your_own-partial.mp4 163.0 MB
- 54525-the_pwnie_awards.mp4 120.4 MB
- 54811-defeating_magic_by_magic:using_alpc_security_features_to_compromise_rpc_services-partial.mp4 64.5 MB
- 54812-spies_and_bytes_victory_in_the_digital_age-partial.mp4 64.4 MB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.