DefCon27
DEFCON-27-Alexandre-Borges-dotNET-Malware-Threats.pdf
5.2 MiB
2019-Aug-05 08:36
DEFCON-27-Alon-Weinberg-Please-inject-me-a-x64-code-injection-Demo.mp4
1.0 MiB
2019-Jul-29 16:53
DEFCON-27-Alon-Weinberg-Please-inject-me-a-x64-code-injection.pdf
808.1 KiB
2019-Aug-01 07:52
DEFCON-27-Alvaro-Munoz-Oleksandr-Mirosh-SSOWars-The-Token-Menace-Demo-Videos.zip
70.5 MiB
2019-Aug-06 17:24
DEFCON-27-Alvaro-Munoz-Oleksandr-Mirosh-SSOWars-The-Token-Menace.pdf
1.3 MiB
2019-Aug-02 12:51
DEFCON-27-Amit-Waisel-and-Hila-Cohen-malproxy-demo.mp4
53.2 MiB
2019-Aug-02 19:57
DEFCON-27-Amit-Waisel-and-Hila-Cohen-malproxy.pdf
2.2 MiB
2019-Jul-29 00:37
DEFCON-27-Andreas-Baumhof-Are-Quantum-Computers-Really-A-Threat-To-Cryptography.pdf
3.8 MiB
2019-Jul-29 00:37
DEFCON-27-Andy-Grant-Unpacking-pkgs.mp4
2.8 MiB
2019-Jul-29 17:40
DEFCON-27-Andy-Grant-Unpacking-pkgs.pdf
1.0 MiB
2019-Aug-06 17:50
DEFCON-27-Anish-Athalye-Strong-Isolation.pdf
18.1 MiB
2019-Aug-08 01:18
DEFCON-27-Ariel-Adversariel-Herbert-Voss-Dont-Red-Team-AI-like-a-Chump.pdf
14.0 MiB
2019-Jul-29 02:24
DEFCON-27-Ben-Morris-More-Keys-Than-A-Piano-Finding-Secrets-In-Publicly-Exposed-Ebs-Volumes.pdf
13.6 MiB
2019-Aug-06 17:43
DEFCON-27-Ben-Sadeghipour-Owning-the-clout-through-SSRF-and-PDF-generators.pdf
2.2 MiB
2019-Jul-29 00:37
DEFCON-27-Bernhard-Mueller-The-Ether-Wars.pdf
3.7 MiB
2019-Jul-29 00:37
DEFCON-27-Bill-Graydon-Restricted-Keys.pdf
41.9 MiB
2019-Jul-29 00:37
DEFCON-27-Bill-Swearingen-HAKC-The-Police.pdf
30.1 MiB
2019-Jul-29 00:37
DEFCON-27-Brad-Dixon-Cheating-in-eSports-How-to-cheat-at-virtual-cycling-using-USB-hacks.compressed.pdf
8.2 MiB
2019-Jul-29 00:37
DEFCON-27-Brad-Dixon-Cheating-in-eSports-How-to-cheat-at-virtual-cycling-using-USB-hacks.pdf
52.0 MiB
2019-Jul-29 00:37
DEFCON-27-Brent-Stone-Reverse-Enginerring-17-Cars-Video-Demo.mp4
4.3 MiB
2019-Jul-29 17:41
DEFCON-27-Brent-Stone-Reverse-Enginerring-17-Cars.pdf
5.2 MiB
2019-Jul-29 00:37
DEFCON-27-Brizendine-Stroschein-The-JOP-ROCKET-DEMO-1.mp4
6.5 MiB
2019-Jul-29 17:42
DEFCON-27-Brizendine-Stroschein-The-JOP-ROCKET-DEMO.mp4
6.5 MiB
2019-Jul-29 17:43
DEFCON-27-Brizendine-Stroschein-The-JOP-ROCKET.pdf
5.3 MiB
2019-Jul-29 00:37
DEFCON-27-Campbell-Murray-GSM-We-can-hear-everyone-now.pdf
781.9 KiB
2019-Aug-08 01:08
DEFCON-27-Christopher-Roberts-DEMO-1.mp4
3.1 MiB
2019-Jul-29 17:44
DEFCON-27-Christopher-Roberts-DEMO-2.mp4
1.3 MiB
2019-Jul-29 17:44
DEFCON-27-Christopher-Roberts-Firmware-Slap-DEMO-1.wmv
63.5 MiB
2019-Jul-27 03:12
DEFCON-27-Christopher-Roberts-Firmware-Slap-DEMO-2.wmv
9.5 MiB
2019-Jul-26 18:50
DEFCON-27-Christopher-Roberts-Firmware-Slap-DEMO-3.wmv
37.9 MiB
2019-Aug-01 05:31
DEFCON-27-Christopher-Roberts-Firmware-Slap.pdf
11.6 MiB
2019-Aug-02 01:45
DEFCON-27-Christopher-Wade-Tag-side-attacks-against-NFC.pdf
4.2 MiB
2019-Jul-29 00:37
DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming.PDF
3.9 MiB
2019-Jul-24 23:33
DEFCON-27-Dan-Regalado-ARM-Syscalls.mp4
2.0 MiB
2019-Jul-29 17:45
DEFCON-27-Dan-Regalado-Defcon27AliDan.pdf
9.5 MiB
2019-Jul-29 00:37
DEFCON-27-Daniel-Romero-and-Mario-Rivas-Why-you-should-fear-your-mundane-office.pdf
3.8 MiB
2019-Aug-08 01:06
DEFCON-27-DimitrySnezhkov-Zombie-Ant-Farm-Practical-Tips.pdf
14.2 MiB
2019-Jul-29 00:37
DEFCON-27-Dirk-jan-Mollema-Im-in-your-cloud-pwning-your-azure-environment.pdf
2.6 MiB
2019-Jul-29 00:37
DEFCON-27-Douglas-McKee-HVACking-Understanding-the-Delta-Between-Security-and-Reality.pdf
8.7 MiB
2019-Jul-29 00:37
DEFCON-27-Elliott-Thompson-Mi-Casa-Su-Casa-Video-Demonstration.mp4
9.5 MiB
2019-Jul-29 17:45
DEFCON-27-Elliott-Thompson-Mi-Casa-Su-Casa.pdf
29.6 MiB
2019-Jul-29 00:37
DEFCON-27-Eyal-Itkin-Say-Cheese-How-I-Ransomwared-Your-DSLR-Camera-Demo.mp4
8.7 MiB
2019-Jul-29 17:46
DEFCON-27-Eyal-Itkin-Say-Cheese-How-I-Ransomwared-Your-DSLR-Camera.pdf
14.1 MiB
2019-Jul-29 00:37
DEFCON-27-Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin.pdf
3.4 MiB
2019-Jul-29 00:37
DEFCON-27-Gregory-Pickett-Breaking-The-Back-End-It-Is-Not-Always-A-Bug.-Sometimes-It-Is-Just-Bad-Design-Demo.mp4
2.3 MiB
2019-Jul-29 17:46
DEFCON-27-Gregory-Pickett-Breaking-The-Back-End-It-Is-Not-Always-A-Bug.-Sometimes-It-Is-Just-Bad-Design.pdf
3.0 MiB
2019-Jul-29 00:37
DEFCON-27-Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding.pdf
4.8 MiB
2019-Jul-29 00:37
DEFCON-27-Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Attacking-VoiP-Configuration-Interfaces.pdf
5.9 MiB
2019-Jul-29 00:38
DEFCON-27-Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All-Demo-Extras.zip
34.4 MiB
2019-Aug-06 17:31
DEFCON-27-Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All.pdf
1.6 MiB
2019-Jul-29 01:39
DEFCON-27-Jack-Baker-Hacking-Web-Assembly-Games.pdf
7.6 MiB
2019-Jul-29 01:39
DEFCON-27-Jacob-Baines-Help-Me-Vulnerabilities.-Youre-My-Only-Hope.pdf
26.6 MiB
2019-Jul-29 01:39
DEFCON-27-Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil.pdf
5.3 MiB
2019-Aug-07 02:25
DEFCON-27-Jeff-Dileo-Evil-eBPF-In-Depth.pdf
1.2 MiB
2019-Jul-29 01:39
DEFCON-27-Jens-Mueller-Re-Whats-up-Johnny-Covert-Content-Attacks-on-Email-End-to-End-Encryption.pdf
2.9 MiB
2019-Jul-29 01:39
DEFCON-27-Jesse-Michael-Get-off-the-kernel-if-you-cant-drive.pdf
2.3 MiB
2019-Jul-29 18:51
DEFCON-27-Jmaxxz-Your-Car-is-My-Car.pdf
6.5 MiB
2019-Jul-29 01:39
DEFCON-27-Joe-Grand-Badge.pdf
31.6 MiB
2019-Aug-06 04:29
DEFCON-27-Joe-Grand-The-DEFCON-27-Badge.pdf
31.5 MiB
2019-Aug-07 02:31
DEFCON-27-Joseph-Cox-How-You-Can-Buy-ATT-T-Mobile-and-Sprint-Real-Time-Location-Data-on-the-Black-Market.pdf
13.7 MiB
2019-Jul-29 01:39
DEFCON-27-Joseph-Menn-Change-the-World-cDc-Style.pdf
435.2 KiB
2019-Jul-29 01:39
DEFCON-27-Joshua-Maddux-API-Induced-SSRF.pdf
1.0 MiB
2019-Jul-29 01:39
DEFCON-27-Junyu-Zhou-and-Ce-Qin-and-Jianing-Wang-Web2Own-Attacking-Desktop-Apps-From-Web-Securitys-Perspective.pdf
6.6 MiB
2019-Jul-29 01:39
DEFCON-27-Katherine-Pratt-Hacking-Your-Thoughts-Batman-Forever-meets-Black-Mirror.pdf
146.2 MiB
2019-Aug-05 13:19
DEFCON-27-Katherine-Pratt-Hacking-Your-Thoughts-Batman-Forever-meets-Black-Mirror.pptx
41.4 MiB
2019-Aug-05 13:18
DEFCON-27-Kyle-Gwinnup-Next-Generation-Process-Emulation-with-Binee-Demo.mp4
10.2 MiB
2019-Jul-29 17:48
DEFCON-27-Kyle-Gwinnup-Next-Generation-Process-Emulation-with-Binee.pdf
806.6 KiB
2019-Jul-29 01:39
DEFCON-27-Leon-Jacobs-Meticulously-Modern-Mobile-Manipulations.pdf
170.2 MiB
2019-Jul-29 01:39
DEFCON-27-Maksim-Shudrak-Zero-Bugs-Found-Hold-My-Beer-AFL-How-to-Improve-Coverage-guided-Fuzzing-and-Find-New-Zero-days-in-Tough-Targets.pdf
3.8 MiB
2019-Jul-29 01:39
DEFCON-27-Masarah-Paquet-Clouston-Olivier-Bilodeau-The-Industry-of-Social-Media-Manipulation-Driven-by-Malware.pdf
22.3 MiB
2019-Jul-29 01:39
DEFCON-27-Masarah-Paquet-Clouston-Olivier-Bilodeau-The-Industry-of-Social-Media-Manipulation-support-video-luminati-sdk-demo.mp4
3.2 MiB
2019-Jul-29 17:48
DEFCON-27-Matt-Wixey-Sound-Effects-Exploring-Acoustic-Cyber-Weapons.pdf
2.4 MiB
2019-Jul-29 01:39
DEFCON-27-Michael-Leibowitz-and-Topher-Timzen-EDR-Is-Coming-Hide-Yo-Sht-WINDOWS-DEMO.mp4
4.3 MiB
2019-Jul-29 17:49
DEFCON-27-Michael-Leibowitz-and-Topher-Timzen-EDR-Is-Coming-Hide-Yo-Sht.pdf
1.5 MiB
2019-Jul-29 01:39
DEFCON-27-Michael-Stepankin-Apache-Solr-Injection.pdf
23.2 MiB
2019-Aug-07 20:12
DEFCON-27-Nicolas-Oberli-Poking-the-S-in-SD-cards-DEMO.mkv
310.8 KiB
2019-Jul-15 14:02
DEFCON-27-Nicolas-Oberli-Poking-the-S-in-SD-cards-DEMO.mp4
1.1 MiB
2019-Jul-29 17:49
DEFCON-27-Nicolas-Oberli-Poking-the-S-in-SD-cards.PDF
2.1 MiB
2019-Jul-19 12:42
DEFCON-27-Nikhil-Mittal-RACE-Minimal-Rights-and-ACE-for-Active-Directory-Dominance.pdf
7.4 MiB
2019-Jul-29 02:24
DEFCON-27-Nina-Kollars-Confessions-of-a-Nespresso-Money-Mule.pdf
1.3 MiB
2019-Jul-29 02:24
DEFCON-27-Omer-Gull-SELECT-code-execution-FROM-USING-SQLite-Demo.mp4
2.6 MiB
2019-Jul-29 17:49
DEFCON-27-Omer-Gull-SELECT-code-execution-FROM-USING-SQLite.pdf
7.1 MiB
2019-Jul-29 02:24
DEFCON-27-Omer-Yair-Exploiting-Windows-Exploit-Mitigation-for-ROP-Exploits-Demo.mp4
2.0 MiB
2019-Jul-29 17:49
DEFCON-27-Omer-Yair-Exploiting-Windows-Exploit-Mitigation-for-ROP-Exploits.pdf
9.6 MiB
2019-Aug-02 14:50
DEFCON-27-Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs-Demo-Video.zip
192.3 MiB
2019-Aug-06 17:36
DEFCON-27-Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs.pdf
6.7 MiB
2019-Aug-01 09:07
DEFCON-27-Panel-DC101-The-Panel.pdf
3.6 MiB
2019-Jul-29 00:38
DEFCON-27-Patrick-Wardle-Harnessing-Weapons-of-Mac-Destruction.pdf
229.3 MiB
2019-Jul-29 02:24
DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks.pdf
7.6 MiB
2019-Jul-29 02:24
DEFCON-27-Phar-No-Mas-How-One-Side-Channel-Flaw-Opens-Atm-Pharmacies-and-Government-Secrets-Up-to-Attack.pdf
40.1 MiB
2019-Jul-29 02:24
DEFCON-27-Philippe-Laulheret-Introduction-to-Hardware-Hacking-Demo-Video.mp4
4.2 MiB
2019-Jul-29 17:50
DEFCON-27-Philippe-Laulheret-Introduction-to-Hardware-Hacking-Extended-Version.pdf
33.4 MiB
2019-Jul-29 02:24
DEFCON-27-Roger-Dingledine-TOR-Censorship-Arms-Race.pdf
4.3 MiB
2019-Aug-07 02:55
DEFCON-27-Sheila-A-Berta-Backdooring-hardware-devices-by-injecting-malicious-payloads-on-Microcontrollers.pdf
30.3 MiB
2019-Jul-29 02:24
DEFCON-27-Travis-Palmer-First-try-DNS-Cache-Poisoning-with-IPv4-and-IPv6-Fragmentation.pdf
3.7 MiB
2019-Aug-01 21:53
DEFCON-27-Truman-Kain-Surveillance-Detection-Scout-Demo.mp4
10.2 MiB
2019-Jul-29 17:51
DEFCON-27-Truman-Kain-Surveillance-Detection-Scout.pdf
61.5 MiB
2019-Jul-29 02:24
DEFCON-27-Wenxiang-Qian-Yuxiang-Li-Huiyu-Wu-Breaking-Google-Home-Exploit-It-with-SQLite-Magellan.pdf
3.3 MiB
2019-Jul-29 02:24
DEFCON-27-WillC-Phreaking-Elevators.pdf
5.5 MiB
2019-Aug-07 06:53
DEFCON-27-Workshop-Anthony-Rose-Introduction-to-AMSI-Bypasses-and-Sandbox-Evasion.pdf
8.9 MiB
2019-Aug-02 03:16
DEFCON-27-Xiaohuihui-All-The-4G-Modules-Could-Be-Hacked.pdf
13.9 MiB
2019-Aug-06 03:27
DEFCON-27-Xiling-Gong-Peter-Pi-Exploiting-Qualcomm-WLAN-and-Modem-Over-The-Air.pdf
2.4 MiB
2019-Jul-29 02:24
DEFCON-27-Yaron-Zinar-and-Marina-Simakov-Relaying-Credentials-Has-Never-Been-Easier-How-to-Easily-Bypass-the-Latest-NTLM-Relay-Mitigations.pdf
57.5 MiB
2019-Jul-29 02:24
DEFCON-27-Zhang-Xiangqian-Liu-Huiming-Your-secret-files-are-mine.pdf
192.4 MiB
2019-Jul-29 02:24
DEFCON-27-albinowax-HTTP-Desync-Attacks-demo.mp4
6.9 MiB
2019-Jul-29 16:53
DEFCON-27-albinowax-HTTP-Desync-Attacks-whitepaper.pdf
395.9 KiB
2019-Jul-29 00:37
DEFCON-27-albinowax-HTTP-Desync-Attacks.pdf
7.6 MiB
2019-Jul-29 00:37
DEFCON-27-d4krm4tter-Mike-Spicer-I-Know-What-You-Did-Last-Summer-Demo.mp4
1.9 MiB
2019-Jul-29 17:44
DEFCON-27-d4krm4tter-Mike-Spicer-I-Know-What-You-Did-Last-Summer.pdf
3.1 MiB
2019-Jul-29 01:39
DEFCON-27-droogie-go-null-yourself.pdf
48.2 MiB
2019-Jul-29 00:37
DEFCON-27-finalphoenix-Rise-of-the-Hypebots.pdf
53.9 MiB
2019-Jul-29 00:37
DEFCON-27-grichter-Reverse-Engineering-4G-Hotspots-For-Fun-Bugs-Net-Financial-Loss-MF910-CSRF-Demo.mp4
214.8 KiB
2019-Jul-29 17:46
DEFCON-27-grichter-Reverse-Engineering-4G-Hotspots-For-Fun-Bugs-Net-Financial-Loss.pdf
9.0 MiB
2019-Jul-29 00:37
DEFCON-27-jiska-fabian-vacuum-cleaning-security.pdf
1.6 MiB
2019-Jul-29 01:39
DEFCON-27-smea-Adventures-in-smart-buttplug-penetration-testing.pdf
3.0 MiB
2019-Aug-07 19:50