DEF CON 29
File List
- DEF CON 29 presentations/Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.pptx 298.8 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations.mp4 284.0 MB
- DEF CON 29 presentations/Dennis Giese - Robots with lasers and cameras but no security- Liberating your vacuum from the cloud.pdf 249.4 MB
- DEF CON 29 video and slides/DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.mp4 200.0 MB
- DEF CON 29 contests/Auto Driving CTF/DEF CON 29 AutoDriving CTF - Junjie Shen - lanedet_env.rar 169.8 MB
- DEF CON 29 video and slides/DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.mp4 168.5 MB
- DEF CON 29 contests/Auto Driving CTF/DEF CON 29 AutoDriving CTF - Junjie Shen - advnpc_env.rar 161.9 MB
- DEF CON 29 contests/Auto Driving CTF/DEF CON 29 AutoDriving CTF - Junjie Shen - gpsspoof_env.rar 156.6 MB
- DEF CON 29 video and slides/DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.mp4 146.8 MB
- DEF CON 29 video and slides/DEF CON 29 - Paz Hameiri - TEMPEST radio station.mp4 136.2 MB
- DEF CON 29 video and slides/DEF CON 29 - Christian quaddi Dameff MD Jeff r3plicant Tully MD Jessica Wilkerson Josh Corman - Do No harm- Health Panel.mp4 130.1 MB
- DEF CON 29 video and slides/DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.mp4 127.3 MB
- DEF CON 29 video and slides/DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.mp4 126.1 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Harshit Agrawal - Defending IoT in the Future of High Tech Warfare.mp4 125.5 MB
- DEF CON 29 video and slides/DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.mp4 119.5 MB
- DEF CON 29 video and slides/DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.mp4 118.9 MB
- DEF CON 29 video and slides/DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.mp4 114.1 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Ken Pyle - BLUEMONDAY Series Exploitation and Mapping of Vulnerable Devices at Scale.mp4 111.0 MB
- DEF CON 29 music/DEF CON 29 OST - flac/03 - RBM - The Incident.flac 111.0 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Jose Garduno - C2Centipede APT level C2 communications for common reverse HTTP shell tools.mp4 110.0 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC failures with RedELK.mp4 108.8 MB
- DEF CON 29 video and slides/DEF CON 29 - Dan Petro - You're Doing IoT RNG.mp4 103.7 MB
- DEF CON 29 video and slides/DEF CON 29 - Roy Davis - No Key-No PIN-No Combo - No Problem P0wning ATMs For Fun and Profit.mp4 103.4 MB
- DEF CON 29 video and slides/DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.mp4 102.8 MB
- DEF CON 29 video and slides/DEF CON 29 - Babak Javadi Nick Draffen Eric Bettse Anze Jensterle - The PACS-man Comes For Us All.mp4 101.7 MB
- DEF CON 29 presentations/Samarkand - Hacking Viber Messenger with 0day Vulnerabilities- Sniffing and DoS.zip 100.9 MB
- DEF CON 29 video and slides/DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.mp4 100.3 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days.mp4 99.6 MB
- DEF CON 29 video and slides/DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.mp4 98.8 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Alexi Kojenov - I used AppSec Skills to Hack IoT and So Can You.mp4 98.8 MB
- DEF CON 29 video and slides/DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.mp4 97.9 MB
- DEF CON 29 video and slides/DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.mp4 97.4 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Tim Jensen EapolSniper - IoT Testing Crash Course.mp4 97.4 MB
- DEF CON 29 video and slides/DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.mp4 97.1 MB
- DEF CON 29 villages/DEF CON 29 HHV - Bradan Lane - The PortaProg Project.mp4 96.2 MB
- DEF CON 29 video and slides/DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.mp4 95.8 MB
- DEF CON 29 video and slides/DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.mp4 95.6 MB
- DEF CON 29 video and slides/DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.mp4 94.4 MB
- DEF CON 29 music/DEF CON 29 OST - flac/04 - Seeker - Modulations.flac 94.0 MB
- DEF CON 29 video and slides/DEF CON 29 - hyp3ri0n aka Alejandro Caceres Jason Hopper - PunkSPIDER and IOStation- Making a Mess All Over the Internet.mp4 93.6 MB
- DEF CON 29 video and slides/DEF CON 29 - Richard Thieme AKA neuralcowboy - UFOs - Misinformation, Disinformation, and the Basic Truth.mp4 93.3 MB
- DEF CON 29 video and slides/DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.mp4 92.8 MB
- DEF CON 29 villages/DEF CON 29 Payment Village - Meadow Ellis - Automated Tear Machines.mp4 92.4 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Elazari Tarkhanyan and Cheruvu - The Journey of Establishing IoT Trustworthiness.mp4 91.8 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Daniel Duggan - Designing a C2 Framework.mp4 90.7 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Cheryl Biswas - Signed, Sealed, Delivered Comparing Chinese APTs behind Software Supply Chain Attacks.mp4 90.4 MB
- DEF CON 29 video and slides/DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.mp4 90.4 MB
- DEF CON 29 contests/Auto Driving CTF/DEF CON 29 AutoDriving CTF - Junjie Shen - adcprog_env.rar 89.8 MB
- DEF CON 29 video and slides/DEF CON 29 - Agent X - A look inside security at the New York Times.mp4 88.6 MB
- DEF CON 29 video and slides/DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.mp4 87.9 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Keynote - David Kennedy.mp4 87.1 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Hutch - Alexa Have You Been Compromised.mp4 86.9 MB
- DEF CON 29 video and slides/DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.mp4 86.1 MB
- DEF CON 29 video and slides/DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.mp4 84.5 MB
- DEF CON 29 video and slides/DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.mp4 84.3 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Petro and Cecil - You're Doing IoT RNG.mp4 83.8 MB
- DEF CON 29 video and slides/DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.mp4 83.8 MB
- DEF CON 29 video and slides/DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.mp4 83.6 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Cheryl Biswas - Mind the Gap Managing Insecurity in Enterprise IoT.mp4 83.6 MB
- DEF CON 29 video and slides/DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.mp4 83.0 MB
- DEF CON 29 video and slides/DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.mp4 83.0 MB
- DEF CON 29 video and slides/DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.mp4 82.5 MB
- DEF CON 29 video and slides/DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.mp4 81.5 MB
- DEF CON 29 video and slides/DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.mp4 81.1 MB
- DEF CON 29 video and slides/DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.mp4 80.9 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Matthew Eidelberg - Operation Bypass Catch My Payload If You Can.mp4 80.4 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Sessler and Hendricks - IoT Devices as Government Witnesses.mp4 80.3 MB
- DEF CON 29 video and slides/DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.mp4 80.3 MB
- DEF CON 29 video and slides/DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.mp4 78.0 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Messdaghi and Eddy - Representation Matters.mp4 75.2 MB
- DEF CON 29 video and slides/DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.mp4 74.3 MB
- DEF CON 29 presentations/Salvador Mendoza - PINATA- PIN Automatic Try Attack - Slides.pdf 74.0 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Ria Cheruvu - Ethics at the Edge.mp4 72.9 MB
- DEF CON 29 video and slides/DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.mp4 72.2 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Waylon Grange - 1.21 Gigawatts Vulnerabilities in Solar Panels.mp4 71.4 MB
- DEF CON 29 video and slides/DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.mp4 71.2 MB
- DEF CON 29 workshops/DEF CON 29 Workshop Ben Kurtz Writing Golang Malware Workshop Source.zip 71.0 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - David Hunt - Prelude Operator.mp4 70.4 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Carlos Polop - New generation of PEAS.mp4 69.9 MB
- DEF CON 29 video and slides/DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.mp4 69.6 MB
- DEF CON 29 villages/DEF CON 29 HHV - Ben Gardiner - A Lazy Solve of @mediumrehr's HHV Challeng 6.mp4 69.2 MB
- DEF CON 29 video and slides/DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.mp4 69.2 MB
- DEF CON 29 music/DEF CON 29 OST - flac/08 - Synd - Close Your Eyes.flac 68.4 MB
- DEF CON 29 video and slides/DEF CON 29 - Salvador Mendoza - PINATA- PIN Automatic Try Attack.mp4 68.3 MB
- DEF CON 29 presentations/Babak Javadi Nick Draffen Eric Bettse Anze Jensterle - The PACS-man Comes For Us All.pdf 68.1 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation.mp4 67.9 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Mark Loveless - A Short History and An Example Attack.mp4 67.2 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Ted Harrington - When Penetration Testing Isnt Penetration Testing At All.mp4 66.7 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Gil Biton - Scaling Up Offensive Pipelines.mp4 66.6 MB
- DEF CON 29 video and slides/DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.mp4 66.0 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Daniel Isler - How I got COVID in a RedTeam-SE and physical intrusion for attack sim.mp4 65.2 MB
- DEF CON 29 video and slides/DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.mp4 65.2 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Samuel Kimmons - Intro to Adversary Emulation.mp4 64.5 MB
- DEF CON 29 music/DEF CON 29 OST - flac/20 - Rushfell - Bad Wisdom.flac 63.9 MB
- DEF CON 29 video and slides/DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.mp4 63.9 MB
- DEF CON 29 video and slides/DEF CON 29 - Eugene Lim Glenice Tan Tan Kee Hock - Hacking Humans with AI as a Service.mp4 63.6 MB
- DEF CON 29 video and slides/DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.mp4 63.5 MB
- DEF CON 29 video and slides/DEF CON 29 - Mickey Shkatov Jesse Michael - High-Stakes Updates - BIOS RCE OMG WTF BBQ.mp4 62.9 MB
- DEF CON 29 music/DEF CON 29 OST - flac/01 - Skittish & Bus - The Signal (featuring The Dark Tangent).flac 62.2 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Sergey Chubarov - From On-Prem to the Cloud - Hybrid AD attack path.mp4 61.9 MB
- DEF CON 29 video and slides/DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.mp4 61.8 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Sanne Maasakkers - Phish Like An APT.mp4 59.6 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Mauro Eldritch & Luis Ramirez - Everything is a C2 if you're brave enough.mp4 58.6 MB
- DEF CON 29 video and slides/DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.mp4 58.6 MB
- DEF CON 29 music/DEF CON 29 OST - flac/05 - Mystery Club - Starlight (GOASTS Human In The Loop Remix).flac 58.1 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Hadad and Kaufman - Reverse Supply Chain Attack.mp4 57.9 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Shantanu Khandelwal - Red Team Credentials Reconnaissance (OLD with a TWIST).mp4 56.7 MB
- DEF CON 29 music/DEF CON 29 OST - flac/16 - Damn The Data - Can't Stop The Signal.flac 56.6 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Victor Hanna - LED Light Lunacy.mp4 56.4 MB
- DEF CON 29 video and slides/DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.mp4 55.5 MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).mp4 54.2 MB
- DEF CON 29 villages/DEF CON 29 Payment Village - Hector Cuevas Cruz - ATM Transaction Reversal Frauds And how to fight them.mp4 52.9 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Atul & Harshal - Tenacity An Adversary Emulation Tool for Persistence.mp4 52.5 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Ross and Balazs - MIPS-X the Next IoT Frontier.mp4 52.0 MB
- DEF CON 29 video and slides/DEF CON 29 - Joseph Gabay - DoS- Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.mp4 51.9 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Jonas Bulow Knudsen Tool Demo ImproHound - Identify AD tiering violations.mp4 51.4 MB
- DEF CON 29 music/DEF CON 29 OST - flac/18 - Ohm-I - Domain (featuring Yung Innanet) (Remix).flac 51.0 MB
- DEF CON 29 villages/DEF CON 29 BIC Village - Nico Smith - 40 Cores and A CPU.mp4 50.5 MB
- DEF CON 29 video and slides/DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.mp4 48.4 MB
- DEF CON 29 video and slides/DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.mp4 48.0 MB
- DEF CON 29 music/DEF CON 29 OST - flac/12 - c64 - Sunsetting.flac 47.7 MB
- DEF CON 29 music/DEF CON 29 OST - flac/02 - Archwisp - Throw It Back (featuring Jotunvillur).flac 47.6 MB
- DEF CON 29 video and slides/DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.mp4 46.8 MB
- DEF CON 29 music/DEF CON 29 OST - flac/19 - KEN BAE BG - Barking For Broccoli (featuring Marni Doll & Boppy Stitch) (DEF CON 29 Edit).flac 46.7 MB
- DEF CON 29 video and slides/DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.mp4 46.7 MB
- DEF CON 29 villages/DEF CON 29 BIC Village - Ochaun Marshall - The OPSEC of Protesting.mp4 46.7 MB
- DEF CON 29 presentations/Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.pptx 45.2 MB
- DEF CON 29 presentations/Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.pdf 44.3 MB
- DEF CON 29 video and slides/DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.mp4 44.3 MB
- DEF CON 29 video and slides/DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.mp4 43.3 MB
- DEF CON 29 villages/DEFCON 29 IoT Village - Juneau - Strategic Trust and Deception in the Internet of Things.mp4 41.6 MB
- DEF CON 29 villages/DEF CON 29 BIC Village - Keith Chapman - The Action Plan for Cyber Diversity.mp4 40.2 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Phillip Wylie - The Way of The Adversary.mp4 39.5 MB
- DEF CON 29 music/DEF CON 29 OST - flac/07 - bash explode - serial.flac 39.3 MB
- DEF CON 29 video logos/DC29 logo - origami.mp4 39.0 MB
- DEF CON 29 video logos/DC29 logo - wavy crystal.mp4 39.0 MB
- DEF CON 29 video logos/DC29 logo - 3d swril.mp4 39.0 MB
- DEF CON 29 video logos/DC29 logo - fly over wavy grid.mp4 38.9 MB
- DEF CON 29 video logos/DC29 logo - wire tunnel fast.mp4 38.9 MB
- DEF CON 29 video and slides/DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.mp4 38.3 MB
- DEF CON 29 music/DEF CON 29 OST - flac/09 - DJ Spin & Tonic - Val's Dragon.flac 38.2 MB
- DEF CON 29 music/DEF CON 29 OST - flac/21 - Dual Core - The Same Time.flac 35.2 MB
- DEF CON 29 video and slides/DEF CON 29 - David Dworken - Worming through IDEs.mp4 35.1 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Juneau Jones - Game Theory Understanding and Strategy and Deception.mp4 33.8 MB
- DEF CON 29 music/DEF CON 29 OST - flac/17 - Mikal kHill - Spent Our Lives On Fire (featuring Tribe One).flac 33.1 MB
- DEF CON 29 music/DEF CON 29 OST - flac/11 - pbarry25 - We're All Alike (Original Mix).flac 32.8 MB
- DEF CON 29 music/DEF CON 29 OST - flac/14 - Yung Innanet - Unbound (Max James Remix).flac 32.8 MB
- DEF CON 29 music/DEF CON 29 OST - flac/06 - Mateusz Drozd - Station X1 Galaxy Citron.flac 32.4 MB
- DEF CON 29 music/DEF CON 29 OST - flac/10 - 1336 - Synapticity.flac 31.5 MB
- DEF CON 29 video logos/DC29 logo - blob.mp4 31.3 MB
- DEF CON 29 presentations/Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.pptx 28.8 MB
- DEF CON 29 presentations/Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.pdf 28.7 MB
- DEF CON 29 villages/DEF CON 29 HHV - Gigs - The Black Box and the Brain Box When Electronics and Deception Collide.mp4 28.5 MB
- DEF CON 29 music/DEF CON 29 OST - flac/15 - int eighty - No Answer.flac 28.5 MB
- DEF CON 29 presentations/Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.odp 28.1 MB
- DEF CON 29 presentations/Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.pdf 26.5 MB
- DEF CON 29 video logos/DC29 logo - Xwing targeting computer.mp4 25.9 MB
- DEF CON 29 villages/DEF CON 29 Payment Village - Timur Yunusov - What happens when businesses decide to enrol cryptocurrency cards.mp4 25.2 MB
- DEF CON 29 villages/DEF CON 29 BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industry.mp4 24.2 MB
- DEF CON 29 presentations/Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.pdf 22.9 MB
- DEF CON 29 presentations/Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.pptx 22.8 MB
- DEF CON 29 villages/DEF CON 29 Payment Village - Vahagn Vardanyan - Racing cryptoexchanges or how I manipulated the balances.mp4 21.6 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Stephan Wampouille - Autonomous lateral movement.mp4 21.2 MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Abhijith B R - Village kick-off.mp4 20.9 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/03 - RBM - The Incident.opus 20.5 MB
- DEF CON 29 music/DEF CON 29 OST - flac/13 - Autocorrect - Outside.flac 20.3 MB
- DEF CON 29 presentations/Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.pptx 20.2 MB
- DEF CON 29 video logos/DC29 logo - green glitchy.mp4 19.7 MB
- DEF CON 29 video logos/DC29 logo - green fast sweep.mp4 17.6 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/04 - Seeker - Modulations.opus 17.4 MB
- DEF CON 29 presentations/Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.pdf 17.2 MB
- DEF CON 29 video logos/DC29 logo - Flowing purple blob wave.mp4 16.4 MB
- DEF CON 29 presentations/Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.pdf 14.6 MB
- DEF CON 29 presentations/Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.pdf 14.4 MB
- DEF CON 29 presentations/Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.pdf 13.5 MB
- DEF CON 29 presentations/Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.pdf 13.5 MB
- DEF CON 29 presentations/Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.pdf 13.3 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/20 - Rushfell - Bad Wisdom.opus 13.1 MB
- DEF CON 29 presentations/Samarkand - Hacking Viber Messenger with 0day Vulnerabilities- Sniffing and DoS.pdf 13.1 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/05 - Mystery Club - Starlight (GOASTS Human In The Loop Remix).opus 13.0 MB
- DEF CON 29 presentations/Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).pptx 13.0 MB
- DEF CON 29 art contest/Inna Vasilye-Pika DC29.jpg 12.9 MB
- DEF CON 29 program.pdf 12.6 MB
- DEF CON 29 presentations/Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.key 12.5 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/08 - Synd - Close Your Eyes.opus 12.4 MB
- DEF CON 29 presentations/Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.pdf 12.4 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/12 - c64 - Sunsetting.opus 12.1 MB
- DEF CON 29 video and slides/DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.mp4 11.8 MB
- DEF CON 29 presentations/Joseph Gabay - Dos- Denial of Shopping – Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.pdf 11.7 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/01 - Skittish & Bus - The Signal (featuring The Dark Tangent).opus 11.6 MB
- DEF CON 29 workshops/DEF CON 29 Workshop Ben Kurtz Writing Golang Malwar.pdf 10.9 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/18 - Ohm-I - Domain (featuring Yung Innanet) (Remix).opus 10.8 MB
- DEF CON 29 presentations/Eugene Lim Glenice Tan Tan Kee Hock - Hacking Humans with AI as a Service.pptx 10.7 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/02 - Archwisp - Throw It Back (featuring Jotunvillur).opus 10.3 MB
- DEF CON 29 presentations/Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.pptx 10.2 MB
- DEF CON 29 presentations/Tamas K Lengyel - Fuzzing Linux with Xen.pdf 10.0 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/16 - Damn The Data - Can't Stop The Signal.opus 10.0 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/07 - bash explode - serial.opus 9.6 MB
- DEF CON 29 contests/Sticker Design Contest/DEF CON 29 Sicker Contest - 4.png 9.5 MB
- DEF CON 29 presentations/Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.pdf 9.4 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/11 - pbarry25 - We're All Alike (Original Mix).opus 9.2 MB
- DEF CON 29 presentations/Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.pdf 9.1 MB
- DEF CON 29 presentations/Tianze Ding - Vulnerability Exchange- One Domain Account For More Than Exchange Server RCE.pdf 9.0 MB
- DEF CON 29 presentations/Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.pdf 9.0 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/19 - KEN BAE BG - Barking For Broccoli (featuring Marni Doll & Boppy Stitch) (DEF CON 29 Edit).opus 9.0 MB
- DEF CON 29 events/ToxicBBQ-History-Zine-Printable.pdf 8.2 MB
- DEF CON 29 contests/Auto Driving CTF/DEF CON 29 AutoDrivingCTF - Zhisheng - DemoChallenges.mp4 8.1 MB
- DEF CON 29 presentations/Agent X - TBA.pptx 8.0 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/09 - DJ Spin & Tonic - Val's Dragon.opus 7.8 MB
- DEF CON 29 video and slides/DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Demo.mp4 7.7 MB
- DEF CON 29 video and slides/DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.mp4 7.7 MB
- DEF CON 29 presentations/Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.pdf 7.3 MB
- DEF CON 29 presentations/Salvador Mendoza - PINATA- PIN Automatic Try Attack.pdf 7.3 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/06 - Mateusz Drozd - Station X1 Galaxy Citron.opus 7.2 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/21 - Dual Core - The Same Time.opus 7.2 MB
- DEF CON 29 presentations/Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.pdf 7.2 MB
- DEF CON 29 presentations/Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).pdf 6.8 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/10 - 1336 - Synapticity.opus 6.7 MB
- DEF CON 29 art contest/Jorge Amezuca DC29.jpg 6.6 MB
- DEF CON 29 presentations/Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.pdf 6.6 MB
- DEF CON 29 presentations/Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.odp 6.5 MB
- DEF CON 29 presentations/Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.pdf 6.3 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/14 - Yung Innanet - Unbound (Max James Remix).opus 6.2 MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.mp4 6.2 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/15 - int eighty - No Answer.opus 6.1 MB
- DEF CON 29 contests/Sticker Design Contest/DEF CON 29 Sicker Contest - 6.png 5.9 MB
- DEF CON 29 video and slides/DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.mp4 5.9 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/17 - Mikal kHill - Spent Our Lives On Fire (featuring Tribe One).opus 5.9 MB
- DEF CON 29 video and slides/DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.mp4 5.5 MB
- DEF CON 29 workshops/DEF CON 29 Workshop Romain Zaikin From Zero to Hero in Web Security Research.pdf 5.4 MB
- DEF CON 29 presentations/Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.pptx 5.3 MB
- DEF CON 29 presentations/Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.pptx 5.2 MB
- DEF CON 29 presentations/Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.pptx 5.0 MB
- DEF CON 29 presentations/Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.pdf 4.9 MB
- DEF CON 29 presentations/Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.pdf 4.9 MB
- DEF CON 29 presentations/Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.pdf 4.8 MB
- DEF CON 29 video and slides/DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.mp4 4.8 MB
- DEF CON 29 presentations/Jacob Baines - Bring Your Own Print Driver Vulnerability.pdf 4.7 MB
- DEF CON 29 presentations/Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.pdf 4.7 MB
- DEF CON 29 art contest/Malin Hess DC29.png 4.7 MB
- DEF CON 29 presentations/Brian Hong - Sleight of ARM - Demystifying Intel Houdini-Slides.pdf 4.6 MB
- DEF CON 29 presentations/Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.pdf 4.6 MB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/13 - Autocorrect - Outside.opus 4.5 MB
- DEF CON 29 presentations/Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.pdf 4.5 MB
- DEF CON 29 presentations/Ian Vitek - Central bank digital currency, threats and vulnerabilities.pptx 4.4 MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.mp4 4.2 MB
- DEF CON 29 presentations/_hyp3ri0n aka Alejandro Caceres Jason Hopper - PunkSPIDER and IOStation- Making a Mess All Over the Internet.pptx 4.1 MB
- DEF CON 29 presentations/Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.pdf 4.0 MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.mp4 3.9 MB
- DEF CON 29 presentations/jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.pdf 3.9 MB
- DEF CON 29 video and slides/DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2 - Demo Palo Alto.mp4 3.8 MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.mp4 3.7 MB
- DEF CON 29 presentations/Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.pdf 3.7 MB
- DEF CON 29 video and slides/DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.mp4 3.7 MB
- DEF CON 29 workshops/DEF CON 29 Workshop Kristy Westphal Analysis 101 and 102 For Incident Responders.pdf 3.6 MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.mp4 3.5 MB
- DEF CON 29 presentations/Eugene Lim Glenice Tan Tan Kee Hock - Hacking Humans with AI as a Service.pdf 3.4 MB
- DEF CON 29 presentations/Rotem Bar - Abusing SAST tools When scanners do more than just scanning.pdf 3.4 MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.mp4 3.4 MB
- DEF CON 29 workshops/DEF CON 29 Workshop Anthony Rose Evading Detection A Beginners Guide to Obfuscation.pdf 3.3 MB
- DEF CON 29 presentations/Brian Hong - Sleight of ARM - Demystifying Intel Houdini.pdf 3.1 MB
- DEF CON 29 video and slides/DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2 - Demo SonicWall.mp4 3.1 MB
- DEF CON 29 video and slides/DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.mp4 3.0 MB
- DEF CON 29 contests/Sticker Design Contest/DEF CON 29 Sicker Contest - 9.png 3.0 MB
- DEF CON 29 contests/Sticker Design Contest/DEF CON 29 Sicker Contest - 10.png 2.9 MB
- DEF CON 29 presentations/Claire Vacherot - Sneak into buildings with KNXnetIP.pdf 2.8 MB
- DEF CON 29 presentations/Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.pptx 2.8 MB
- DEF CON 29 events/ToxicBBQ-History-Continuous.pdf 2.8 MB
- DEF CON 29 contests/Sticker Design Contest/DEF CON 29 Sicker Contest - 12.png 2.7 MB
- DEF CON 29 presentations/Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.pdf 2.6 MB
- DEF CON 29 contests/Sticker Design Contest/DEF CON 29 Sicker Contest - 7.png 2.6 MB
- DEF CON 29 presentations/Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.pdf 2.6 MB
- DEF CON 29 presentations/Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.pdf 2.6 MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.mp4 2.5 MB
- DEF CON 29 presentations/Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.pdf 2.4 MB
- DEF CON 29 video and slides/DEF CON 29 - Joseph Gabay - Dos- Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.mp4 2.2 MB
- DEF CON 29 contests/Sticker Design Contest/DEF CON 29 Sicker Contest - 5.png 2.2 MB
- DEF CON 29 video and slides/DEF CON 29 - Joseph Gabay - Dos- Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.mp4 2.1 MB
- DEF CON 29 presentations/Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.pdf 2.0 MB
- DEF CON 29 presentations/Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.pdf 2.0 MB
- DEF CON 29 presentations/David Dworken - Worming through IDEs.pdf 1.9 MB
- DEF CON 29 workshops/DEF CON 29 Workshop Ash Secure Messaging.pdf 1.9 MB
- DEF CON 29 contests/Sticker Design Contest/DEF CON 29 Sicker Contest - 3.png 1.9 MB
- DEF CON 29 presentations/PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.pdf 1.8 MB
- DEF CON 29 presentations/Ian Vitek - Central bank digital currency, threats and vulnerabilities.pdf 1.7 MB
- DEF CON 29 workshops/DEF CON 29 Workshop Michael Solomon DFIRADA Slides Student.pdf 1.7 MB
- DEF CON 29 art contest/Hacker Empress - Pandemic Love (2020) DC29.jpeg 1.6 MB
- DEF CON 29 presentations/Christopher Wade - Breaking Secure Bootloaders.pdf 1.5 MB
- DEF CON 29 presentations/Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High(-Level) Languages.pdf 1.2 MB
- DEF CON 29 contests/Sticker Design Contest/DEF CON 29 Sicker Contest - 2.png 1.1 MB
- DEF CON 29 presentations/Paz Hameiri - TEMPEST radio station-Slides.pdf 1.1 MB
- DEF CON 29 workshops/DEF CON 29 Workshop Eigentourist Hacking The Metal.pdf 1.1 MB
- DEF CON 29 presentations/Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Slides.pdf 1023.4 KB
- DEF CON 29 presentations/Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.pdf 980.2 KB
- DEF CON 29 presentations/James Kettle - HTTP2 - The Sequel is Always Worse - Slides.pdf 975.3 KB
- DEF CON 29 workshops/DEF CON 29 Workshop Philippe Delteil Bug Bounty Workshop.pdf 859.3 KB
- DEF CON 29 presentations/Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.pptx 843.1 KB
- DEF CON 29 presentations/Dan Petro - Youre Doing IoT RNG.pdf 794.4 KB
- DEF CON 29 presentations/Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.pdf 776.4 KB
- DEF CON 29 presentations/Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections - Slides.pdf 709.4 KB
- DEF CON 29 presentations/James Kettle - HTTP2 - The Sequel is Always Worse - Whitepaper.pdf 656.0 KB
- DEF CON 29 presentations/Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.pdf 567.3 KB
- DEF CON 29 presentations/Paz Hameiri - TEMPEST radio station.pdf 554.0 KB
- DEF CON 29 art contest/Lucy Nguyen DC29.png 476.7 KB
- DEF CON 29 presentations/Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.pdf 440.4 KB
- DEF CON 29 contests/Sticker Design Contest/DEF CON 29 Sicker Contest - 1.png 413.0 KB
- DEF CON 29 music/DEF CON 29 OST - flac/cover.png 370.4 KB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/cover.png 370.4 KB
- DEF CON 29 contests/Auto Driving CTF/DEF CON 29 AutoDrivingCTF - Zhisheng - logo.png 328.0 KB
- DEF CON 29 contests/Sticker Design Contest/DEF CON 29 Sicker Contest - 11.png 265.7 KB
- DEF CON 29 contests/Sticker Design Contest/DEF CON 29 Sicker Contest - 8.png 96.5 KB
- DEF CON 29 short story contest/PEOPLES CHOICE AWARD - FAICT by Serum.txt 30.9 KB
- DEF CON 29 short story contest/FIRST PLACE - Networks by Gwisinkoht.txt 20.4 KB
- DEF CON 29 short story contest/Democrasoft by Burninator.txt 17.9 KB
- DEF CON 29 short story contest/The Indomitable Signal by Panda.txt 12.9 KB
- DEF CON 29 short story contest/Untitled by phonebook.txt 11.7 KB
- DEF CON 29 short story contest/SECOND PLACE - Repository Upload by Alfred Rowdy.txt 8.6 KB
- DEF CON 29 music/DEF CON 29 OST - flac/DEF CON 29 OST README.txt 2.2 KB
- DEF CON 29 music/DEF CON 29 OST - opus 320k/DEF CON 29 OST README.txt 2.2 KB
- DEF CON 29 presentations/Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric - tools.zip 1.7 KB
- DEF CON 29 workshops/DEF CON 29 Workshop Michael Solomon DFIRADA Welcome README.txt 917 bytes
- DEF CON 29 contests/Auto Driving CTF/DEF CON 29 AutoDrivingCTF - Zhisheng - Intro.txt 879 bytes
- DEF CON 29 presentations/Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-goose.txt 686 bytes
- DEF CON 29 workshops/DEF CON 29 Workshop Michael Solomon DFIRADA VM Hashes.txt 201 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.