DEF CON 25 presentations
1.04 GB
Total Size
100
Files
April
Created
0
Seeders
1
Leechers
Basic Info
Hash: 724461c1f5de80fe1b7bc8fbfacfd213e2d05c7f
File Status: Single-file
Type: Public
File List (100 Files)
Dimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf
#1•
PDF
71.01 MB
DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf
#2•
PDF
1.87 MB
DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf
#3•
PDF
1.64 MB
DEFCON-25-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation-UPDATED.pdf
#4•
PDF
5.53 MB
DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf
#5•
PDF
2.16 MB
Dor Azouri/DEFCON-25-Dor-Azouri-BITSInject.pdf
#6•
PDF
827.94 KB
Dor Azouri/DEFCON-25-Dor-Azouri-BITSInject-WP.pdf
#7•
PDF
1.46 MB
DEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf
#8•
PDF
6.14 MB
DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware-UPDATED.pdf
#9•
PDF
3.33 MB
Morten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf
#10•
PDF
1.97 MB