Congress Papers

H  2020  2019  2018  2017  2016  2015  2014  2013  2012


Datum

Název

Categorie

Conference

2020DEFCON-27-Anish-Athalye-Demo-Video/ DefCon
2020DEFCON-27-Bernhard-Mueller-Demo-Videos/ DefCon
2020DEFCON-27-Bill-Graydon-Demo-Videos/ DefCon
2020DEFCON-27-Christopher-Wade-Tag-side-attacks-against-NFC-Demo-Videos/ DefCon
2020DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming-Demo-Video/ DefCon
2020DEFCON-27-Dimitry-Snezhkov-Demo-Video/ DefCon
2020DEFCON-27-Dirk-jan-Mollema-Demo-Videos/ DefCon
2020DEFCON-27-Douglas-McKee-Demo-Video/ DefCon
2020DEFCON-27-Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Demo-Video/ DefCon
2020DEFCON-27-Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding-Extras/ DefCon
2020DEFCON-27-Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Demo-Video/ DefCon
2020DEFCON-27-Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All-Demo-Video/ DefCon
2020DEFCON-27-Jack-Baker-Hacking-Web-Assembly-Games-Demo-Video/ DefCon
2020DEFCON-27-Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil-Demo-Video/ DefCon
2020DEFCON-27-Jeff-Dileo-Evil-eBPF-In-Depth-Extras/ DefCon
2020DEFCON-27-Jens-Mueller-Re-Whats-up-Johnny-Covert-Content-Attacks-Extras/ DefCon
2020DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Code-6e0e599/ DefCon
2020DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Demo-Videos/ DefCon
2020DEFCON-27-Joshua-Maddux-API-Induced-SSRF-Demo-Video/ DefCon
2020DEFCON-27-Leon-Jacobs-Meticulously-Modern-Mobile-Manipulations-Demo-Video/ DefCon
2020DEFCON-27-Maksim-Shudrak-Zero-Bugs-Found-Hold-My-Beer-Extras/ DefCon
2020DEFCON-27-Nikhil-Mittal-RACE-Minimal-Rights-and-ACE-for-Active-Directory-Dominance-Demo-Video/ DefCon
2020DEFCON-27-Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs-Demo-Video/ DefCon
2020DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks-Demo-Video/ DefCon
2020DEFCON-27-Sheila-A-Berta-Backdooring-hardware-devices-by-injecting-malicious-payloads-on-Microcontrollers-Demo-Video/ DefCon
2020DEFCON-27-Xiling-Gong-and-Peter-Pi-Exploiting-Qualcomm-WLAN-and-Modem-Over-The-Air-Demo-Video/ DefCon
2020DEFCON-27-Yaron-Zinar-and-Marina-Simakov-Relaying-Credentials-Has-Never-Been-Easier-Demo-Video/ DefCon
2020DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/ DefCon
2020DEFCON-27-finalphoenix-Rise-of-the-Hypebots-Demo-Video/ DefCon
2020DEFCON-27-Alexandre-Borges-dotNET-Malware-Threats.pdf DefCon
2020DEFCON-27-Alon-Weinberg-Please-inject-me-a-x64-code-injection-Demo.mp4 DefCon
2020DEFCON-27-Alon-Weinberg-Please-inject-me-a-x64-code-injection.pdf DefCon
2020DEFCON-27-Alvaro-Munoz-Oleksandr-Mirosh-SSOWars-The-Token-Menace-Demo-Videos.zip DefCon
2020DEFCON-27-Alvaro-Munoz-Oleksandr-Mirosh-SSOWars-The-Token-Menace.pdf DefCon
2020DEFCON-27-Amit-Waisel-and-Hila-Cohen-malproxy-demo.mp4 DefCon
2020DEFCON-27-Amit-Waisel-and-Hila-Cohen-malproxy.pdf DefCon
2020DEFCON-27-Andreas-Baumhof-Are-Quantum-Computers-Really-A-Threat-To-Cryptography.pdf DefCon
2020DEFCON-27-Andy-Grant-Unpacking-pkgs.mp4 DefCon
2020DEFCON-27-Andy-Grant-Unpacking-pkgs.pdf DefCon
2020DEFCON-27-Anish-Athalye-Strong-Isolation.pdf DefCon
2020DEFCON-27-Ariel-Adversariel-Herbert-Voss-Dont-Red-Team-AI-like-a-Chump.pdf DefCon
2020DEFCON-27-Ben-Morris-More-Keys-Than-A-Piano-Finding-Secrets-In-Publicly-Exposed-Ebs-Volumes.pdf DefCon
2020DEFCON-27-Ben-Sadeghipour-Owning-the-clout-through-SSRF-and-PDF-generators.pdf DefCon
2020DEFCON-27-Bernhard-Mueller-The-Ether-Wars.pdf DefCon
2020DEFCON-27-Bill-Graydon-Restricted-Keys.pdf DefCon
2020DEFCON-27-Bill-Swearingen-HAKC-The-Police.pdf DefCon
2020DEFCON-27-Brad-Dixon-Cheating-in-eSports-How-to-cheat-at-virtual-cycling-using-USB-hacks.compressed.pdf DefCon
2020DEFCON-27-Brad-Dixon-Cheating-in-eSports-How-to-cheat-at-virtual-cycling-using-USB-hacks.pdf DefCon
2020DEFCON-27-Brent-Stone-Reverse-Enginerring-17-Cars-Video-Demo.mp4 DefCon
2020DEFCON-27-Brent-Stone-Reverse-Enginerring-17-Cars.pdf DefCon
2020DEFCON-27-Brizendine-Stroschein-The-JOP-ROCKET-DEMO-1.mp4 DefCon
2020DEFCON-27-Brizendine-Stroschein-The-JOP-ROCKET-DEMO.mp4 DefCon
2020DEFCON-27-Brizendine-Stroschein-The-JOP-ROCKET.pdf DefCon
2020DEFCON-27-Campbell-Murray-GSM-We-can-hear-everyone-now.pdf DefCon
2020DEFCON-27-Christopher-Roberts-DEMO-1.mp4 DefCon
2020DEFCON-27-Christopher-Roberts-DEMO-2.mp4 DefCon
2020DEFCON-27-Christopher-Roberts-Firmware-Slap-DEMO-1.wmv DefCon
2020DEFCON-27-Christopher-Roberts-Firmware-Slap-DEMO-2.wmv DefCon
2020DEFCON-27-Christopher-Roberts-Firmware-Slap-DEMO-3.wmv DefCon
2020DEFCON-27-Christopher-Roberts-Firmware-Slap.pdf DefCon
2020DEFCON-27-Christopher-Wade-Tag-side-attacks-against-NFC.pdf DefCon
2020DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming.PDF DefCon
2020DEFCON-27-Dan-Regalado-ARM-Syscalls.mp4 DefCon
2020DEFCON-27-Dan-Regalado-Defcon27AliDan.pdf DefCon
2020DEFCON-27-Daniel-Romero-and-Mario-Rivas-Why-you-should-fear-your-mundane-office.pdf DefCon
2020DEFCON-27-DimitrySnezhkov-Zombie-Ant-Farm-Practical-Tips.pdf DefCon
2020DEFCON-27-Dirk-jan-Mollema-Im-in-your-cloud-pwning-your-azure-environment.pdf DefCon
2020DEFCON-27-Douglas-McKee-HVACking-Understanding-the-Delta-Between-Security-and-Reality.pdf DefCon
2020DEFCON-27-Elliott-Thompson-Mi-Casa-Su-Casa-Video-Demonstration.mp4 DefCon
2020DEFCON-27-Elliott-Thompson-Mi-Casa-Su-Casa.pdf DefCon
2020DEFCON-27-Eyal-Itkin-Say-Cheese-How-I-Ransomwared-Your-DSLR-Camera-Demo.mp4 DefCon
2020DEFCON-27-Eyal-Itkin-Say-Cheese-How-I-Ransomwared-Your-DSLR-Camera.pdf DefCon
2020DEFCON-27-Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin.pdf DefCon
2020DEFCON-27-Gregory-Pickett-Breaking-The-Back-End-It-Is-Not-Always-A-Bug.-Sometimes-It-Is-Just-Bad-Design-Demo.mp4 DefCon
2020DEFCON-27-Gregory-Pickett-Breaking-The-Back-End-It-Is-Not-Always-A-Bug.-Sometimes-It-Is-Just-Bad-Design.pdf DefCon
2020DEFCON-27-Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding.pdf DefCon
2020DEFCON-27-Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Attacking-VoiP-Configuration-Interfaces.pdf DefCon
2020DEFCON-27-Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All-Demo-Extras.zip DefCon
2020DEFCON-27-Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All.pdf DefCon
2020DEFCON-27-Jack-Baker-Hacking-Web-Assembly-Games.pdf DefCon
2020DEFCON-27-Jacob-Baines-Help-Me-Vulnerabilities.-Youre-My-Only-Hope.pdf DefCon
2020DEFCON-27-Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil.pdf DefCon
2020DEFCON-27-Jeff-Dileo-Evil-eBPF-In-Depth.pdf DefCon
2020DEFCON-27-Jens-Mueller-Re-Whats-up-Johnny-Covert-Content-Attacks-on-Email-End-to-End-Encryption.pdf DefCon
2020DEFCON-27-Jesse-Michael-Get-off-the-kernel-if-you-cant-drive.pdf DefCon
2020DEFCON-27-Jmaxxz-Your-Car-is-My-Car.pdf DefCon
2020DEFCON-27-Joe-Grand-Badge.pdf DefCon
2020DEFCON-27-Joe-Grand-The-DEFCON-27-Badge.pdf DefCon
2020DEFCON-27-Joseph-Cox-How-You-Can-Buy-ATT-T-Mobile-and-Sprint-Real-Time-Location-Data-on-the-Black-Market.pdf DefCon
2020DEFCON-27-Joseph-Menn-Change-the-World-cDc-Style.pdf DefCon
2020DEFCON-27-Joshua-Maddux-API-Induced-SSRF.pdf DefCon
2020DEFCON-27-Junyu-Zhou-and-Ce-Qin-and-Jianing-Wang-Web2Own-Attacking-Desktop-Apps-From-Web-Securitys-Perspective.pdf DefCon
2020DEFCON-27-Katherine-Pratt-Hacking-Your-Thoughts-Batman-Forever-meets-Black-Mirror.pdf DefCon
2020DEFCON-27-Katherine-Pratt-Hacking-Your-Thoughts-Batman-Forever-meets-Black-Mirror.pptx DefCon
2020DEFCON-27-Kyle-Gwinnup-Next-Generation-Process-Emulation-with-Binee-Demo.mp4 DefCon
2020DEFCON-27-Kyle-Gwinnup-Next-Generation-Process-Emulation-with-Binee.pdf DefCon
2020DEFCON-27-Leon-Jacobs-Meticulously-Modern-Mobile-Manipulations.pdf DefCon
2020DEFCON-27-Maksim-Shudrak-Zero-Bugs-Found-Hold-My-Beer-AFL-How-to-Improve-Coverage-guided-Fuzzing-and-Find-New-Zero-days-in-Tough-Targets.pdf DefCon
2020DEFCON-27-Masarah-Paquet-Clouston-Olivier-Bilodeau-The-Industry-of-Social-Media-Manipulation-Driven-by-Malware.pdf DefCon
2020DEFCON-27-Masarah-Paquet-Clouston-Olivier-Bilodeau-The-Industry-of-Social-Media-Manipulation-support-video-luminati-sdk-demo.mp4 DefCon
2020DEFCON-27-Matt-Wixey-Sound-Effects-Exploring-Acoustic-Cyber-Weapons.pdf DefCon
2020DEFCON-27-Michael-Leibowitz-and-Topher-Timzen-EDR-Is-Coming-Hide-Yo-Sht-WINDOWS-DEMO.mp4 DefCon
2020DEFCON-27-Michael-Leibowitz-and-Topher-Timzen-EDR-Is-Coming-Hide-Yo-Sht.pdf DefCon
2020DEFCON-27-Michael-Stepankin-Apache-Solr-Injection.pdf DefCon
2020DEFCON-27-Nicolas-Oberli-Poking-the-S-in-SD-cards-DEMO.mkv DefCon
2020DEFCON-27-Nicolas-Oberli-Poking-the-S-in-SD-cards-DEMO.mp4 DefCon
2020DEFCON-27-Nikhil-Mittal-RACE-Minimal-Rights-and-ACE-for-Active-Directory-Dominance.pdf DefCon
2020DEFCON-27-Nicolas-Oberli-Poking-the-S-in-SD-cards.PDF DefCon
2020DEFCON-27-Nina-Kollars-Confessions-of-a-Nespresso-Money-Mule.pdf DefCon
2020DEFCON-27-Omer-Gull-SELECT-code-execution-FROM-USING-SQLite-Demo.mp4 DefCon
2020DEFCON-27-Omer-Gull-SELECT-code-execution-FROM-USING-SQLite.pdf DefCon
2020DEFCON-27-Omer-Yair-Exploiting-Windows-Exploit-Mitigation-for-ROP-Exploits-Demo.mp4 DefCon
2020DEFCON-27-Omer-Yair-Exploiting-Windows-Exploit-Mitigation-for-ROP-Exploits.pdf DefCon
2020DEFCON-27-Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs.pdf DefCon
2020DEFCON-27-Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs-Demo-Video.zip DefCon
2020DEFCON-27-Panel-DC101-The-Panel.pdf DefCon
2020DEFCON-27-Patrick-Wardle-Harnessing-Weapons-of-Mac-Destruction.pdf DefCon
2020DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks.pdf DefCon
2020DEFCON-27-Phar-No-Mas-How-One-Side-Channel-Flaw-Opens-Atm-Pharmacies-and-Government-Secrets-Up-to-Attack.pdf DefCon
2020DEFCON-27-Philippe-Laulheret-Introduction-to-Hardware-Hacking-Demo-Video.mp4 DefCon
2020DEFCON-27-Philippe-Laulheret-Introduction-to-Hardware-Hacking-Extended-Version.pdf DefCon
2020DEFCON-27-Roger-Dingledine-TOR-Censorship-Arms-Race.pdf DefCon
2020DEFCON-27-Sheila-A-Berta-Backdooring-hardware-devices-by-injecting-malicious-payloads-on-Microcontrollers.pdf DefCon
2020DEFCON-27-Travis-Palmer-First-try-DNS-Cache-Poisoning-with-IPv4-and-IPv6-Fragmentation.pdf DefCon
2020DEFCON-27-Truman-Kain-Surveillance-Detection-Scout-Demo.mp4 DefCon
2020DEFCON-27-Truman-Kain-Surveillance-Detection-Scout.pdf DefCon
2020DEFCON-27-Wenxiang-Qian-Yuxiang-Li-Huiyu-Wu-Breaking-Google-Home-Exploit-It-with-SQLite-Magellan.pdf DefCon
2020DEFCON-27-WillC-Phreaking-Elevators.pdf DefCon
2020DEFCON-27-Workshop-Anthony-Rose-Introduction-to-AMSI-Bypasses-and-Sandbox-Evasion.pdf DefCon
2020DEFCON-27-Xiaohuihui-All-The-4G-Modules-Could-Be-Hacked.pdf DefCon
2020DEFCON-27-Xiling-Gong-Peter-Pi-Exploiting-Qualcomm-WLAN-and-Modem-Over-The-Air.pdf DefCon
2020DEFCON-27-Yaron-Zinar-and-Marina-Simakov-Relaying-Credentials-Has-Never-Been-Easier-How-to-Easily-Bypass-the-Latest-NTLM-Relay-Mitigations.pdf DefCon
2020DEFCON-27-Zhang-Xiangqian-Liu-Huiming-Your-secret-files-are-mine.pdf DefCon
2020DEFCON-27-albinowax-HTTP-Desync-Attacks-demo.mp4 DefCon
2020DEFCON-27-albinowax-HTTP-Desync-Attacks-whitepaper.pdf DefCon
2020DEFCON-27-albinowax-HTTP-Desync-Attacks.pdf DefCon
2020DEFCON-27-d4krm4tter-Mike-Spicer-I-Know-What-You-Did-Last-Summer-Demo.mp4 DefCon
2020DEFCON-27-d4krm4tter-Mike-Spicer-I-Know-What-You-Did-Last-Summer.pdf DefCon
2020DEFCON-27-droogie-go-null-yourself.pdf DefCon
2020DEFCON-27-finalphoenix-Rise-of-the-Hypebots.pdf DefCon
2020DEFCON-27-grichter-Reverse-Engineering-4G-Hotspots-For-Fun-Bugs-Net-Financial-Loss-MF910-CSRF-Demo.mp4 DefCon
2020DEFCON-27-grichter-Reverse-Engineering-4G-Hotspots-For-Fun-Bugs-Net-Financial-Loss.pdf DefCon
2020DEFCON-27-jiska-fabian-vacuum-cleaning-security.pdf DefCon
2020

DEFCON-27-smea-Adventures-in-smart-buttplug-penetration-testing.pdf

 DefCon
2019Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Updated.pdf DefCon
2019DEFCON-26-0x200b-Detecting-Blue-Team-Research-Through-Targeted-Ads-Updated.pdf DefCon
2019DEFCON-26-Alex-Levinson-Overview-of-Genesis-Scripting-Engine.pdf DefCon
2019DEFCON-26-Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses-Updated.pdf DefCon
2019DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story-Updated.pdf DefCon
2019DEFCON-26-Amir-Etemadieh-Zenofex-Dissecting-Teddy-Ruxpin-Reverse-Engineering-the-Smart Bear.pdf DefCon
2019DEFCON-26-Bai-Zheng-Chai-Wang-You-May-Have-Paid-more-than-You-Imagine.pdf DefCon
2019DEFCON-26-Closing-Ceremonies.pdf DefCon
2019DEFCON-26-DEFCON-Groups-Panel.pdf DefCon
2019DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Updated.pdf DefCon
2019DEFCON-26-Daniel-Zolnikov-Politics-and-the-Surveillence-State-Updated.pdf DefCon
2019DEFCON-26-Dennis-Giese-Having-Fun-With-IOT-Updated.pdf DefCon
2019DEFCON-26-Douglas-McKee-80-to-0-in-5-sec-falsifying-medical-pt-vitals-updated.pdf DefCon
2019DEFCON-26-Eckert-Sumner-Krause-Inside-the-Fake-Science-Factory-Updated.pdf DefCon
2019DEFCON-26-Eduardo-Izycki-And-Rodrigo-Colli-Digital-Leviathan-Nation-State-Big-Brothers-Updated.pdf DefCon
2019DEFCON-26-Egypt-One-Liners-to-Rule-Them-All-Updated.pdf DefCon
2019DEFCON-26-Eric-Sesterhenn-Soviet-Russia-Smartcard-Hacks-You.pdf DefCon
2019DEFCON-26-Fireside-Panel-D0-N0-H4RM.pdf DefCon
2019DEFCON-26-Fireside-Panel-Goerzen-and-Matthews-Beyond-The-Lulz-Updated.pdf DefCon
2019DEFCON-26-Foster-and-Ayrey-Lost-and-Found-Certs-residual-certs-for-pre-owned-domains-Updated.pdf DefCon
2019DEFCON-26-Galloway-and-Yunusov-For-the-love-of-Money-Finding-And-Exploiting-Vulns-In-Mobile-POS-Updated.pdf DefCon
2019DEFCON-26-George-Tarnovsky-Reverse-Engineering-X-ray-v4-Ciscobooth.pdf DefCon
2019DEFCON-26-Holtmanns-Singh-4G-Who-is-Paying-your-cell-phone-bill.pdf DefCon
2019DEFCON-26-Ian-Haken-Automated-Discovery-of-Deserialization-Gadget-Chains.pdf DefCon
2019DEFCON-26-Jeanette-Manfra-Securing-Election-Infrastructure-updated.pdf DefCon
2019DEFCON-26-Jianjun-Dai-Guang-Gong-Wenlin-Yang-Pwning-The-Toughest-Target-Updated.pdf DefCon
2019DEFCON-26-Joe-Grand-Searching-for-the-Light-Adventures-w-Opticspy.pdf DefCon
2019DEFCON-26-John-Seymour-and-Azeem-Aqil-Your-Voice-is-My-Passport.pdf DefCon
2019DEFCON-26-Joshua-Franklin-and-Kevin-Franklin-Defending-the-2018-Midterm-Elections.pdf DefCon
2019DEFCON-26-L0pht-Testimony-20-years-later.pdf DefCon
2019DEFCON-26-Ladar-Levison-and-hon1nbo-Booby-Trapping-Boxes.pdf DefCon
2019DEFCON-26-Lawshae-Who-Controls-the-Controllers-Hacking-Crestron.pdf DefCon
2019DEFCON-26-Louis-Dion-Marcil-Edge-Side-Include-Injection-Updated.pdf DefCon
2019DEFCON-26-Maggie-Mayhem-Sex-Work-After-SESTA.pdf DefCon
2019DEFCON-26-Maksim-Shudrak-Fuzzing-Malware-For-Fun-and-Profit-updated.pdf DefCon
2019DEFCON-26-Marina-Krotofil-and-Jos-Wetzels-Through-the-Eyes-of-the-attacker.pdf DefCon
2019DEFCON-26-Martin-Vigo-Compromising-Online-Cracking-Voicemail-Systems-Updated.pdf DefCon
2019DEFCON-26-Matt-King-Micro-Renovator-Bringing-Proc-Firmware-Up-To-Code-Updated.pdf DefCon
2019DEFCON-26-Matt-Knight-and-Ryan-Speers-Designing-RF-Fuzzing-Tools-to-Expose-PHY-Layer-Vulns-Updated.pdf DefCon
2019DEFCON-26-Matt-Wixey-Betrayed-by-the-Keyboard-Updated.pdf DefCon
2019DEFCON-26-Matthews-Adams-Greco-Youre-Just-Complaining-Because-Youre-Guilty.pdf DefCon
2019DEFCON-26-Michael-Ossmann-and-Dominic-Spill-Revolting-Radios.pdf DefCon
2019DEFCON-26-Mickey-Shkatov-and-Jesse-Micheal-UEFI-Exploitation-For-The-Masses.pdf DefCon
2019DEFCON-26-Min-Zheng-Xiaolong-Bai-Fasten-your-Seatbelts-Escaping-iOS-11-Sandbox-Updated.pdf DefCon
2019DEFCON-26-Nick-Cano-Relocation-Bonus-Attacking-the-Win-Loader.pdf DefCon
2019DEFCON-26-Nils-Amiet-and-Yolan-Romailler-Reaping-and-breaking-keys-at-scale-when-crypto-meets-big-data-Updated.pdf DefCon
2019DEFCON-26-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-and-Pop-0days-Out-Updated.pdf DefCon
2019DEFCON-26-Panel-DC101-The-Panel.pdf DefCon
2019DEFCON-26-Paternotte-and-van-Ommeren-It-WISNt-Me-Attacking-Industrial-Wireless-Mesh.pdf DefCon
2019DEFCON-26-Rachel-Greenstadt-and-Aylin-Caliskan-De-anonymizing-Programmers.pdf DefCon
2019DEFCON-26-Richard-Thieme-The-Road-to-Resilience-Updated.pdf DefCon
2019DEFCON-26-Rousseau-and-Seymour-Finding-Xori-Malware-Analysis-Triage-w-Auto-Disassembly.pdf DefCon
2019DEFCON-26-Seamus-Burke-Journey-Into-Hexagon.pdf DefCon
2019DEFCON-26-Sean-Metcalf-Exploiting-Administrator-Insecurities-Updated.pdf DefCon
2019DEFCON-26-Sheila-A-Berta-and-Sergio-De-Los-Santos-Tracking-Android-Malware-Developers.pdf DefCon
2019DEFCON-26-Sheng-Hao-Ma-aaaddress1-Playing-Malware-Injection-with-Exploits-Thoughts.pdf DefCon
2019DEFCON-26-Shortxstack-and-Seth-Law-Building-the-Hacker-tracker.pdf DefCon
2019DEFCON-26-Si-and-AgentX-Wagging-The-Tail.pdf DefCon
2019DEFCON-26-Siegfried-Rasthofer-and-Stephan-Huber-All-Your-Family-Secrets-Belong-to-Us-Updated.pdf DefCon
2019DEFCON-26-Slava-Makkaveev-Man-In-The-Disk.pdf DefCon
2019DEFCON-26-Stark-Riedesel-and-Parsia-Hakimian-Tineola-Taking-Bite-Out-of-Enterprise-Blockchain-updated.pdf DefCon
2019DEFCON-26-Steven-Danneman-Your-Banks-Digital-Side-Door-Updated.pdf DefCon
2019DEFCON-26-TYMKRS-and-DT-Welcome-Official-Badge-Talk.pdf DefCon
2019DEFCON-26-Thanh-Bui-and-Siddharth-Rao-Last-Mile-Auth-Problem-Exploiting-End-to-End-Updated.pdf DefCon
2019DEFCON-26-The-Tarquin-Weaponizing-Unicode-Homographs-Beyond-IDNs.pdf DefCon
2019DEFCON-26-Thiago-Alves-Hacking-PLCs-and-Causing-Havoc-on-Critical-Infrastructures-Updated.pdf DefCon
2019DEFCON-26-Vincent-Tan-Hacking-BLE-Bicycle-Locks-Updated.pdf DefCon
2019DEFCON-26-Wu-HuiYu-and-Qian-Wenxiang-Breaking-Smart-Speakers-Updated.pdf DefCon
2019DEFCON-26-Xiaolong-Bai-and-Min-Zheng-One-Bite-And-All-Your-Dreams-Will-Come-True-Updated.pdf DefCon
2019DEFCON-26-sghctoma-all-your-math-are-belong-to-us-updated.pdf DefCon
2019DEFCON-26-smea-Jailbreaking-the-3DS.pdf DefCon
2019DEFCON-26-zerosum0x0-Eternal-Exploits.pdf DefCon
2019RMEMPTY.EXE DefCon
2019move-single-file-1.bat DefCon
2019move-single-file-2.bat DefCon
2019DEFCON-26-Yaniv-Balmas-What-The-FAX.pdf DefCon
2019DEFCON-26-YawnBox-Emerald-Onion-Privacy-Infrastructure-Challenges-and-Opportunites.pdf DefCon
2019DEFCON-26-Yingtao-Zeng-Lin-Huang-Jun-Li-Lora-Water-Meter-Security-Analysis.pdf DefCon
2019DEFCON-26-Yu-Wang-Attacking-The-MacOS-Kernel-Graphics-Driver-Updated.pdf DefCon
2019DEFCON-26-Yuwei-Zheng-Shaokun-Cao-Bypass-the-SecureBoot-and-etc-on-NXP-SOCs-Updated.pdf DefCon
2019DEFCON-26-m010ch_Attacking-the-knox-box-and-other-keyed-alike-systems-Updated.pdf DefCon