5A1F/ | - |
Cheng Lei/ | - |
Denton Gentry/ | - |
Dimitry Snezhkov/ | - |
Dor Azouri/ | - |
Duncan Woodbury and Nicholas Haltmeyer/ | - |
Itzik Kotler and Amit Klein/ | - |
Josh Pitts/ | - |
Mark Newlin Logan Lamb and Christopher Grayson/ | - |
Matt Knight and Marc Newlin/ | - |
Matt Suiche/ | - |
Morten Schenk/ | - |
Phillip Tully and Michael Raggo/ | - |
Romain Coltel and Yves Le Provost/ | - |
Steinthor Bjarnason and Jason Jones/ | - |
Tomer Cohen/ | - |
DEFCON-25-0ctane-Untrustworthy-Hardware.pdf | 2.5 MiB |
DEFCON-25-Alvaro-Munoz-JSON-attacks.pdf | 1.8 MiB |
DEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf | 3.0 MiB |
DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf | 2.5 MiB |
DEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf | 3.2 MiB |
DEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf | 4.3 MiB |
DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf | 2.4 MiB |
DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA.pdf | 5.0 MiB |
DEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf | 1.8 MiB |
DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf | 2.2 MiB |
DEFCON-25-Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf | 6.9 MiB |
DEFCON-25-Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf | 799.3 KiB |
DEFCON-25-Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf | 616.5 KiB |
DEFCON-25-Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf | 69.2 KiB |
DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Course-Guide.pdf | 2.0 MiB |
DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf | 1.7 MiB |
DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf | 7.4 MiB |
DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf | 2.4 MiB |
DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe.pdf | 4.0 MiB |
DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf | 2.7 MiB |
DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf | 250.0 KiB |
DEFCON-25-Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf | 2.3 MiB |
DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf | 6.0 MiB |
DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf | 4.6 MiB |
DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns.pdf | 2.0 MiB |
DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf | 4.1 MiB |
DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf | 4.2 MiB |
DEFCON-25-Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf | 10.6 MiB |
DEFCON-25-Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf | 4.2 MiB |
DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent.pdf | 2.2 MiB |
DEFCON-25-Joe-Rozner-Wiping-Out-CSRF.pdf | 131.4 KiB |
DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf | 4.5 MiB |
DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf | 1.5 MiB |
DEFCON-25-Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf | 290.1 KiB |
DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf | 3.0 MiB |
DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil.pdf | 6.0 MiB |
DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch.pdf | 1.3 MiB |
DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf | 6.5 MiB |
DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf | 5.5 MiB |
DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf | 4.8 MiB |
DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks.pdf | 2.4 MiB |
DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf | 5.9 MiB |
DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf | 1.9 MiB |
DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools.pdf | 4.5 MiB |
DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf | 8.4 MiB |
DEFCON-25-Plore-Popping-a-Smart-Gun.pdf | 4.1 MiB |
DEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf | 6.7 MiB |
DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf | 2.2 MiB |
DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf | 2.5 MiB |
DEFCON-25-Salvador-Mendoza-Exploiting-0ld-Magstripe-Info-with-New-Technology.pdf | 5.2 MiB |
DEFCON-25-Scott-Behrens-and-Jeremy-Heffner-Starting-The-Avalanche-Application-DoS-In-Microservice-Architectures.pdf | 2.0 MiB |
DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf | 911.6 KiB |
DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf | 6.0 MiB |
DEFCON-25-Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf | 6.8 MiB |
DEFCON-25-Svea-Eckert-Andreas-Dewes-Dark-Data.pdf | 6.2 MiB |
DEFCON-25-Tess-Schrodinger-Total-Recall.pdf | 5.0 MiB |
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf | 2.0 MiB |
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf | 20.7 MiB |
DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf | 1.9 MiB |
DEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf | 2.2 MiB |
DEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf | 4.9 MiB |
DEFCON-25-William-Knowles-Persisting-With-Microsoft-Office.pdf | 2.8 MiB |
DEFCON-25-XlogicX-Assembly-Language-Is-Too-High-Level.pdf | 7.5 MiB |
DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf | 1.6 MiB |
DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf | 5.1 MiB |
DEFCON-25-r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf | 3.2 MiB |
DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf | 5.8 MiB |
DEFCON-25-spaceB0x-Exploiting-Continuous-Integration.pdf | 2.0 MiB |
DEFCON-25-zerosum0x0-alephnaught-Koadic-C3.pdf | 1.9 MiB |