Alexei-Bulazel-Reverse-Engineering-Windows-Defender.pdf | 39.7 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story-Updated.pdf | 4.6 MiB | 2018-Aug-04 03:36 |
DEFCON-26-Andrea-Marcelli-Looking-for-the-perfect-signature-automatic-YARA-rules.pdf | 4.1 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Bai-Zheng-Chai-Wang-You-May-Have-Paid-more-than-You-Imagine.pdf | 9.3 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Christopher-Domas-GOD-MODE- UNLOCKED-hardware-backdoors-in-x86-CPUs.pdf | 7.6 MiB | 2018-Aug-04 05:28 |
DEFCON-26-Christopher-Domas-The-Ring-0-Facade.pdf | 3.7 MiB | 2018-Aug-04 05:28 |
DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Updated.pdf | 1.7 MiB | 2018-Aug-04 09:06 |
DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices.pdf | 1.7 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Crowley-Paredes-Savage-Outsmarting-the-Smart-City-Updated.pdf | 68.2 MiB | 2018-Aug-04 05:36 |
DEFCON-26-Daniel-Zolnikov-Politics-and-the-Surveillence-State.pdf | 467.6 KiB | 2018-Jul-27 08:59 |
DEFCON-26-David-Melendez-Project-Interceptor-WP.pdf | 7.1 MiB | 2018-Jul-27 08:59 |
DEFCON-26-David-Melendez-Project-Interceptor.pdf | 8.1 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You.pdf | 31.8 MiB | 2018-Jul-27 09:01 |
DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf | 31.8 MiB | 2018-Aug-04 05:31 |
DEFCON-26-Douglas-McKee-80-to-0-in-5-sec-falsifying-medical-pt-vitals.pdf | 59.5 MiB | 2018-Jul-27 09:01 |
DEFCON-26-Douglas-McKee-80-to-0-in-5-sec-falsifying-medical-pt-vitals-updated.pdf | 59.5 MiB | 2018-Aug-04 13:26 |
DEFCON-26-Douglas-McKee-80-to-0-in-5-sec-falsifying-medical-pt-vitals-updated.pptx | 15.2 MiB | 2018-Aug-04 13:26 |
DEFCON-26-Eric-Sesterhenn-Soviet-Russia-Smartcard-Hacks-You.pdf | 1.6 MiB | 2018-Jul-27 09:01 |
DEFCON-26-Xiao-Huang-Liu-Hacking-the-Brain-Custom-Attack-SDN-Controller.pdf | 1002.7 KiB | 2018-Jul-27 09:01 |
DEFCON-26-Gabriel-Ryan-Owning-the-LAN-in-2018-WP.pdf | 5.8 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Gabriel-Ryan-Owning-the-LAN-in-2018.pdf | 16.0 MiB | 2018-Jul-27 09:01 |
DEFCON-26-Joe-Rozner-RE-Targetable-Grammer-Based-Test-Case-Generation-Synfuzz.pdf | 97.3 KiB | 2018-Jul-27 09:00 |
DEFCON-26-John-Seymour-and-Azeem-Aqil-Your-Voice-is-My-Passport.pdf | 9.0 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Josep-Rodriguez-Breaking-Extreme-Networks-WingOS.pdf | 27.9 MiB | 2018-Jul-27 09:00 |
DEFCON-26-L0pht-Testimony-20-years-later.pdf | 214.2 KiB | 2018-Jul-27 09:00 |
DEFCON-26-Galloway-and-Yunusov-For-the-love-of-money-Findingexploiting-vulns-in-mobile-pos-terminals.pdf | 4.0 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Louis-Dion-Marcil-Edge-Side-Include-Injection.pdf | 2.9 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Martin-Vigo-Compromising-Online-Cracking-Voicemail-Systems.pdf | 4.0 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Micheal-West-Colin-Campbell-barcOwned-Popping-shells-with-your-cereal box.pdf | 5.0 MiB | 2018-Aug-04 04:09 |
DEFCON-26-Micheal-West-Colin-Campbell-barcOwned-Popping-shells-with-your-cereal box.pptx | 40.3 MiB | 2018-Aug-04 04:09 |
DEFCON-26-Mickey-Shkatov-and-Jesse-Micheal-UEFI-Exploitation-For-The-Masses.pdf | 18.6 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Morgan-Gangwere-Its-assembler-jim-Notes.pdf | 1.8 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Morgan-Gangwere-Its-assembler-jim.pdf | 3.7 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Nafeez-Compression-Oracle-attacks-on-VPN-Networks-openvpn3-voracle.gif | 4.0 MiB | 2018-Jul-27 07:22 |
DEFCON-26-Nafeez-Compression-Oracle-attacks-on-VPN-Networks.pdf | 3.2 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Nick-Cano-Relocation-Bonus-Attacking-the-Win-Loader.pdf | 35.4 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Patrick-Wardle-Fire-and-Ice.pdf | 126.2 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Patrick-Wardle-The-Mouse-Is-Mightier-Synthetic0Reality.pdf | 193.6 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Ruo-Ando-Asura-PCAP-File-Analyzer-for-Anomaly-Packet-Detection-Multithreading-WP.pdf | 531.3 KiB | 2018-Jul-27 09:00 |
DEFCON-26-Ruo-Ando-Asura-PCAP-File-Analyzer-for-Anomaly-Packet-Detection-Multithreading.pdf | 564.4 KiB | 2018-Jul-27 09:00 |
DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP.pdf | 1.2 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices.pdf | 27.0 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-Updated.pdf | 27.4 MiB | 2018-Aug-04 10:07 |
DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf | 1023.4 KiB | 2018-Aug-01 05:10 |
DEFCON-26-Sanat-Sharma-House-of-Roman.pdf | 17.0 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Sheila-A-Berta-and-Sergio-De-Los-Santos-Tracking-Android-Malware-Developers.pdf | 9.8 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Siegfried-Rasthofer-and-Stephan-Huber-All-Your-Family-Secrets-Belong-to-Us.pdf | 49.6 MiB | 2018-Jul-27 09:00 |
DEFCON-26-Siegfried-Rasthofer-and-Stephan-Huber-All-Your-Family-Secrets-Belong-to-Us-Updated.pdf | 13.4 MiB | 2018-Aug-02 11:46 |
DEFCON-26-Holtmanns-Singh-4G-Who-is-Paying-your-cell-phone-bill.pdf | 56.2 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Slava-Makkaveev-Man-In-The-Disk.pdf | 546.1 KiB | 2018-Jul-27 08:59 |
DEFCON-26-Stark-Riedesel-and-Parsia-Hakimian-Tineola-Taking-Bite-Out-of-Enterprise-Blockchain.pdf | 3.5 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Thanh-Bui-and-Siddharth-Rao-Last-Mile-Auth-Problem-Exploiting-End-to-End.pdf | 789.1 KiB | 2018-Jul-27 08:59 |
DEFCON-26-The-Tarquin-Weaponizing-Unicode-Homographs-Beyond-IDNs.pdf | 1.2 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Thiago-Alves-Hacking-PLCs-and-Causing-Havoc-on-Critical-Infrastructures.pdf | 11.2 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Torani-Buchwald-Nirenberg-Reverse-Engineering-Hacker-Docu-Series.pdf | 32.6 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Truman-Kain-Dragnet-Social-Engineering-Sidekick.pdf | 65.3 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Truman-Kain-Dragnet-Social-Engineering-Sidekick-Updated.pdf | 23.7 MiB | 2018-Aug-03 10:06 |
DEFCON-26-Vincent-Tan-Hacking-BLE-Bicycle-Locks.pdf | 4.8 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Wesley-McGrew-An-Attacker-Looks-at-Docker-WP.pdf | 2.2 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Wesley-McGrew-An-Attacker-Looks-at-Docker.pdf | 240.4 KiB | 2018-Jul-27 08:59 |
DEFCON-26-William-Martin-SMBetray-Backdooring-and-Breaking-Signiatures.pdf | 7.6 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Wu-HuiYu-and-Qian-Wenxiang-Breaking-Smart-Speakers.pdf | 3.4 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Xiaolong-Bai-and-Min-Zheng-One-Bite-And-All-Your-Dreams-Will-Come-True.pdf | 14.5 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Zach-Miller-and-Alex-Kissinger-Infecting-Embedded-Supply-Chain.pdf | 2.8 MiB | 2018-Jul-27 08:59 |
DEFCON-26-Zach-Miller-and-Alex-Kissinger-Infecting-Embedded-Supply-Chain-Updated.pdf | 2.9 MiB | 2018-Aug-04 05:43 |
DEFCON-26-nevermoe-One-Step-Before-Game-Hackers-Andriod-Emulators.pdf | 170.2 KiB | 2018-Jul-27 09:00 |
DEFCON-26-sghctoma-all-your-math-are-belong-to-us.pdf | 15.8 MiB | 2018-Jul-27 08:59 |
DEFCON-26-singe-Practical-and-Improved-Wifi-MitM-with-Mana.pdf | 30.8 MiB | 2018-Jul-27 08:59 |
DEFCON-26-smea-Jailbreaking-the-3DS.pdf | 20.2 MiB | 2018-Jul-27 08:59 |