磁力管家

磁力管家
为您索检到80条磁力链接,耗时18毫秒。 rss

分享给好友

【文档书籍】 DEF CON 2
收录时间:2022-01-12 文档个数:102 文档大小:357.0 MB 最近下载:2025-05-16 人气:3385 磁力链接
  • pdfDEF CON 2 program.pdf 42.1 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Jackal - Radio Overview.m4b 24.3 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Steve Dunnifer - Pirate Radio Battling the FCC.m4b 23.7 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Theora - Privacy and Anonymity on the Internet.m4b 21.4 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Chris Hall - Private Investigator War Stories.m4b 19.4 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Dr. Mark Ludwig - Virus Creation Awards.m4b 18.6 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Winn Schwartau - HERF.m4b 18.4 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Padgett Peterson - Antivirus Programming.m4b 18.1 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Gail Thackeray - Privacy Rights.m4b 17.3 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Damien Thorn.m4b 16.8 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Phil Zimmermann - PGP Keynote.m4b 16.3 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Peter Buruk - What the SPA Does.m4b 16.1 MB
  • m4bDEF CON 2 audio/DEF CON 2 - White Knight - Illegal FBI wire tap activity.m4b 15.4 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Judi Clark - Social Elements in Networking.m4b 14.5 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Mark Lottor - Hacking Cell Phones.m4b 11.9 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Curtis Karnow - Recombinant Culture.m4b 11.7 MB
  • m4bDEF CON 2 audio/DEF CON 2 - The Dark Knight - Hackers in the UK.m4b 11.1 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Annaliza - European Hacker Scene.m4b 8.8 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Winn Schwartau - Tempest.m4b 7.5 MB
  • m4bDEF CON 2 audio/DEF CON 2 - Mr. Upsetter and Damien Thorn - Cellular Workshop.m4b 4.8 MB
【文档书籍】 DEF CON 6
收录时间:2021-04-26 文档个数:232 文档大小:572.3 MB 最近下载:2025-05-15 人气:113 磁力链接
  • pdfDEF CON 6 program.pdf 56.8 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Winn Schwartau - Hacker Jeopardy Friday Night.m4b 48.6 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation Panel Discussion - Securing Distributed Systems - Audio.m4b 44.7 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By the Cult of the Dead Cow (cDc) - The announcement of Back Orfice - Audio.m4b 41.9 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Winn Schwartau - Hacker Jeopardy Saturday Night - Audio.m4b 39.1 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Ian Goldberg and Austin Hill - Cryptanalysis of the GSM Identification Algorithm - Audio.m4b 27.2 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Jennifer Grannick - A Review of Several Major Computer Crime Cases from the Past Year or Two - Audio.m4b 23.3 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Peter Shipley - An Overview of a 2 year Effort in Massive Multi-modem Wardialing - Audio.m4b 22.6 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Mudge - TCPIP Drinking Game.m4b 22.1 MB
  • MPGDEF CON 6 pictures/DEF CON 6 - Lockheed - 072.MPG 21.5 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Bruce Schneier - Tradecraft on Public Networks - Audio.m4b 21.3 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Ian Goldberg and Austin Hill - Announcement of Zero Knowledge Systems - Audio.m4b 20.3 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Dan Veeneman - Future and Existing Satellite Systems - Audio.m4b 19.5 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Richard Thieme - The More Things Change The More They Dont - Audio.m4b 18.3 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Super Dave - Copyright vs. Freedom of Speech - Audio.m4b 18.0 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Winn Schwartau - Introducing the Time Based Security Model and Applying Military Strategies - Audio.m4b 17.6 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Paul Kocher - Designing and Production of the First Dedicated DES Cracker - Audio.m4b 15.8 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Mike Peros - Massive Illegal Wiretapping Exposed - Audio.m4b 14.3 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By John Q. Newman - The Lastest in how to REALLY Not Be Found - Audio.m4b 14.0 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Krusty - Social Engineering Contest - Audio.m4b 13.7 MB
【文档书籍】 DEF CON Conference Programs
收录时间:2021-03-26 文档个数:31 文档大小:871.0 MB 最近下载:2022-05-17 人气:423 磁力链接
  • pdfDEF CON 14 program.pdf 285.6 MB
  • pdfDEF CON 26 program.pdf 93.7 MB
  • pdfDEF CON 06 program.pdf 56.8 MB
  • pdfDEF CON 27 program.pdf 47.0 MB
  • pdfDEF CON 22 program.pdf 43.2 MB
  • pdfDEF CON 02 program.pdf 42.1 MB
  • pdfDEF CON 08 program.pdf 33.3 MB
  • pdfDEF CON 20 program.pdf 31.5 MB
  • pdfDEF CON 09 program.pdf 21.2 MB
  • pdfDEF CON 24 program.pdf 20.3 MB
  • pdfDEF CON China 1 program.pdf 20.3 MB
  • pdfDEF CON 19 program.pdf 19.9 MB
  • pdfDEF CON 28 Safe Mode program.pdf 19.2 MB
  • pdfDEF CON 25 program.pdf 17.1 MB
  • pdfDEF CON 23 program.pdf 16.8 MB
  • pdfDEF CON 21 program.pdf 15.3 MB
  • pdfDEF CON China beta program.pdf 12.5 MB
  • pdfDEF CON 18 program.pdf 11.1 MB
  • pdfDEF CON 28 Safe Mode closing ceremony slides.pdf 9.0 MB
  • pdfDEF CON 15 program.pdf 7.6 MB
【文档书籍】 DEF CON Conference Programs
收录时间:2021-03-25 文档个数:27 文档大小:782.3 MB 最近下载:2025-05-16 人气:293 磁力链接
  • pdfDEFCON-14-Program.pdf 285.6 MB
  • pdfDEFCON-26-Program.pdf 93.7 MB
  • pdfDEFCON-06-Program.pdf 56.8 MB
  • pdfDEFCON-22-Program.pdf 43.2 MB
  • pdfDEFCON-02-Program.pdf 42.1 MB
  • pdfDEFCON-08-Program.pdf 33.3 MB
  • pdfDEFCON-20-Program.pdf 31.5 MB
  • pdfDEFCON-09-Program.pdf 21.2 MB
  • pdfDEFCON-24-Program.pdf 20.3 MB
  • pdfDEFCON-19-Program.pdf 19.9 MB
  • pdfDEF CON 24 Program.pdf 19.3 MB
  • pdfDEFCON-25-Program.pdf 17.1 MB
  • pdfDEFCON-23-Program.pdf 16.8 MB
  • pdfDEFCON-21-program.pdf 15.3 MB
  • pdfDEFCON-18-Program.pdf 11.1 MB
  • pdfDEFCON-15-Program.pdf 7.6 MB
  • pdfDEFCON-17-Program.pdf 6.3 MB
  • pdfDEFCON-13-Program.pdf 6.3 MB
  • pdfDEFCON-04-Program.pdf 5.7 MB
  • pdfDEFCON-11-Program.pdf 5.3 MB
【文档书籍】 Costruisci il tuo Laboratorio e pratica subito con l'elettronica
收录时间:2021-03-11 文档个数:31 文档大小:197.1 MB 最近下载:2025-04-19 人气:610 磁力链接
  • pdfLaboratorio_di_Elettronica-Fascicolo_27.pdf 19.7 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_23.pdf 18.7 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_24.pdf 17.5 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_25.pdf 11.0 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_19.pdf 9.1 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_28.pdf 7.8 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_21.pdf 7.5 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_07.pdf 7.4 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_16.pdf 7.3 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_17.pdf 6.1 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_08.pdf 5.8 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_14.pdf 5.4 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_15.pdf 4.5 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_26.pdf 4.5 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_18.pdf 4.4 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_04.pdf 4.4 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_29.pdf 4.4 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_09.pdf 4.4 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_20.pdf 4.3 MB
  • pdfLaboratorio_di_Elettronica-Fascicolo_11.pdf 4.3 MB
【文档书籍】 DEF CON 2
收录时间:2021-03-09 文档个数:102 文档大小:357.0 MB 最近下载:2025-04-19 人气:201 磁力链接
  • pdfDEF CON 2 program.pdf 42.1 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Jackal - Radio Overview - Audio.m4b 24.3 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Steve Dunnifer - Pirate Radio Battling the FCC - Audio.m4b 23.7 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Theora - Privacy and Anonymity on the Internet - Audio.m4b 21.4 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Chris Hall - Private Investigator War Stories - Audio.m4b 19.4 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Dr. Mark Ludwig - Virus Creation Awards - Audio.m4b 18.6 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Winn Schwartau - HERF - Audio.m4b 18.4 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Padgett Peterson - Antivirus Programming - Audio.m4b 18.1 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Gail Thackeray - Privacy Rights - Audio.m4b 17.3 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Damien Thorn - Audio.m4b 16.8 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Phil Zimmermann - PGP Keynote - Audio.m4b 16.3 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Peter Buruk - What the SPA Does - Audio.m4b 16.1 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By White Knight - Illegal FBI wire tap activity - Audio.m4b 15.4 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Judi Clark - Social Elements in Networking - Audio.m4b 14.5 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Mark Lottor - Hacking Cell Phones - Audio.m4b 11.9 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Curtis Karnow - Recombinant Culture - Audio.m4b 11.7 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By The Dark Knight - Hackers in the UK - Audio.m4b 11.1 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Annaliza - European Hacker Scene - Audio.m4b 8.8 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Winn Schwartau - Tempest - Audio.m4b 7.5 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Mr. Upsetter and Damien Thorn - Cellular Workshop - Audio.m4b 4.8 MB
【文档书籍】 DEF CON Conference Programs
收录时间:2021-03-08 文档个数:27 文档大小:775.6 MB 最近下载:2025-02-24 人气:46 磁力链接
  • pdfDEF CON 14 program.pdf 285.6 MB
  • pdfDEF CON 26 program.pdf 93.7 MB
  • pdfDEF CON 06 program.pdf 56.8 MB
  • pdfDEF CON 22 program.pdf 43.2 MB
  • pdfDEF CON 02 program.pdf 42.1 MB
  • pdfDEF CON 08 program.pdf 33.3 MB
  • pdfDEF CON 20 program.pdf 31.5 MB
  • pdfDEF CON 09 program.pdf 21.2 MB
  • pdfDEF CON 24 program.pdf 20.3 MB
  • pdfDEF CON 19 program.pdf 19.9 MB
  • pdfDEF CON 25 program.pdf 17.1 MB
  • pdfDEF CON 23 program.pdf 16.8 MB
  • pdfDEF CON 21 program.pdf 15.3 MB
  • pdfDEF CON China beta program.pdf 12.5 MB
  • pdfDEF CON 18 program.pdf 11.1 MB
  • pdfDEF CON 15 program.pdf 7.6 MB
  • pdfDEF CON 17 program.pdf 6.3 MB
  • pdfDEF CON 13 program.pdf 6.3 MB
  • pdfDEF CON 04 program.pdf 5.7 MB
  • pdfDEF CON 11 program.pdf 5.3 MB
【文档书籍】 con brio 2nd edition
收录时间:2018-12-02 文档个数:220 文档大小:358.5 MB 最近下载:2025-04-27 人气:53 磁力链接
  • pdfbook.pdf 159.0 MB
  • mp3jack-e90c2f12/track_18.mp3 3.8 MB
  • mp3jack-e90c2f12/track_17.mp3 3.7 MB
  • mp3jack-a10f0240/track_32.mp3 3.7 MB
  • mp3jack-e90c2f12/track_01.mp3 3.5 MB
  • mp3jack-e90c2f12/track_04.mp3 3.1 MB
  • mp3jack-e90c2f12/track_13.mp3 3.0 MB
  • mp3jack-e90c2f12/track_07.mp3 3.0 MB
  • mp3jack-e90c2f12/track_10.mp3 2.9 MB
  • mp3jack-110e1538/track_37.mp3 2.9 MB
  • mp3jack-110e1538/track_54.mp3 2.8 MB
  • mp3jack-e90c2f12/track_14.mp3 2.7 MB
  • mp3jack-e90c2f12/track_16.mp3 2.6 MB
  • mp3jack-110e1538/track_52.mp3 2.5 MB
  • mp3jack-a10f0240/track_35.mp3 2.4 MB
  • mp3jack-e90c2f12/track_03.mp3 2.4 MB
  • mp3jack-e90c2f12/track_05.mp3 2.3 MB
  • mp3jack-e90c2f12/track_12.mp3 2.3 MB
  • mp3jack-110e1538/track_50.mp3 2.3 MB
  • mp3jack-e90c2f12/track_02.mp3 2.2 MB
【文档书籍】 DEF CON 26 presentations
收录时间:2018-09-21 文档个数:696 文档大小:3.8 GB 最近下载:2025-05-15 人气:318 磁力链接
  • pdf0x200b/DEFCON-26-0x200b-Detecting-Blue-Team-Research-Through-Targeted-Ads-Updated.pdf 1.3 MB
  • pdfAlex Levinson/DEFCON-26-Alex-Levinson-Overview-of-Genesis-Scripting-Engine.pdf 9.2 MB
  • pdfAlexandre Borges - Updated/DEFCON-26-Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses-Updated.pdf 5.9 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-1-mpclient.mp4 367.1 kB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-2-outputdebugstringa.mp4 4.8 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-3-file-system.mp4 4.0 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-4-proclist.mp4 2.7 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-5-apicall.mp4 4.1 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-6-fuzz.mp4 7.9 MB
  • pdfAlexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Updated.pdf 42.0 MB
  • mp4Alfonso Garcia and Alejo Murillo - Updated/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_1.mp4 1.6 MB
  • mp4Alfonso Garcia and Alejo Murillo - Updated/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_2.mp4 1.9 MB
  • mp4Alfonso Garcia and Alejo Murillo - Updated/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_3.mp4 1.1 MB
  • pdfAlfonso Garcia and Alejo Murillo - Updated/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story-Updated.pdf 6.2 MB
  • pdfAmanda Rousseau and Rich Seymour/DEFCON-26-Rousseau-and-Seymour-Finding-Xori-Malware-Analysis-Triage-w-Auto-Disassembly.pdf 1.6 MB
  • pdfAmir Etemadieh - ZenoFex/DEFCON-26-Amir-Etemadieh-Zenofex-Dissecting-Teddy-Ruxpin-Reverse-Engineering-the-Smart Bear.pdf 9.7 MB
  • mp4Andrea Marcelli/DEFCON-26-Andrea-Marcelli-Demo-Video.mp4 2.4 MB
  • pdfAndrea Marcelli/DEFCON-26-Andrea-Marcelli-Looking-for-the-perfect-signature-automatic-YARA-rules.pdf 4.3 MB
  • pdfBai Zheng and Chai Wang/DEFCON-26-Bai-Zheng-Chai-Wang-You-May-Have-Paid-more-than-You-Imagine.pdf 9.7 MB
  • pdfChristopher Domas/DEFCON-26-Christopher-Domas-GOD-MODE-UNLOCKED-hardware-backdoors-in-x86-CPUs.pdf 13.6 MB
【文档书籍】 DEF CON 26 workshops
收录时间:2018-08-28 文档个数:24 文档大小:463.4 MB 最近下载:2025-05-08 人气:488 磁力链接
  • pdfDEFCON-26-Workshop-Adam-Steed-and-James-Albany-Attacking-Active-Directory-and-Advanced-Methods-of-Defense-2018.pdf 7.2 MB
  • pdfDEFCON-26-Workshop-Alexandrine-Torrents-and-Arnaud-Soullie-Pentesting-ICS-101.pdf 5.8 MB
  • pdfDEFCON-26-Workshop-Anto-Joseph-and-Clarance-Chio-Hacking-Thingz-Powered-By-Machine-Learning.pdf 3.8 MB
  • pdfDEFCON-26-Workshop-Arun-Magesh-Buzzing-Smart-Devices.pdf 1.1 MB
  • pdfDEFCON-26-Workshop-Bryce-Kunz-and-Kevin-Lustic-Fuzzing-FTW.pdf 2.7 MB
  • pdfDEFCON-26-Workshop-Dave-Porcello-and-Sean-Gallagher-Packet-Mining-for-Privacy-Leakage.pdf 1.9 MB
  • pdfDEFCON-26-Workshop-David-Pearson-The-Truth-is-in-the-Network_-Reverse-Engineering-Application-Layer-Protocols-Via-PCAP.pdf 314.9 MB
  • pdfDEFCON-26-Workshop-David-Turco-and-Jon-Overgaard-Christiansen-Wheres-My-Browser-Learn-Hacking-iOS-and-Android-WebViews.pdf 5.9 MB
  • pdfDEFCON-26-Workshop-Eijah-Decentralized-Hacker-Net.pdf 1.9 MB
  • pdfDEFCON-26-Workshop-Jakub-Botwicz-and-Wojciech-Rauner-Fuzzing-with-AFL-(American-Fuzzy-Lop).pdf 5.3 MB
  • pdfDEFCON-26-Workshop-Joe-Grand-Build-Your-Own-Opticspy.pdf 14.8 MB
  • pdfDEFCON-26-Workshop-Joe-Grand-Hardware-Hacking-Basics.pdf 4.4 MB
  • pdfDEFCON-26-Workshop-Joshua-Pereyda-and-Timothy-Clemans-Advanced-Custom-Network-Protocol-Fuzzing.pdf 349.2 kB
  • pdfDEFCON-26-Workshop-Louis-Nyfenegger-and-Luke-Jahnke-Finding-Needles-in-Haystacks.pdf 5.3 MB
  • pdfDEFCON-26-Workshop-Louis-Nyfenegger-and-Luke-Jahnke-JWAT-Attacking-JSON-WEB-TOKENS.pdf 6.6 MB
  • pdfDEFCON-26-Workshop-Matt-Cheung-Introduction-to-Cryptographic-Attacks.pdf 1.7 MB
  • pdfDEFCON-26-Workshop-Mike-Guirao-Securing-Big-Data-in-Hadoop.pdf 14.0 MB
  • pdfDEFCON-26-Workshop-Nick-Tait-Reverse-Engineering-with-OpenSCAD-and-3D-Printing.pdf 53.7 MB
  • pdfDEFCON-26-Workshop-Sneha-Rajguru-ARM-eXploitation-101.pdf 1.7 MB
  • pdfDEFCON-26-Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID/DEFCON-26-Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID-Theory.pdf 1.6 MB
【文档书籍】 DEF CON 26 presentations
收录时间:2018-08-15 文档个数:1036 文档大小:2.9 GB 最近下载:2025-05-15 人气:450 磁力链接
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-1-mpclient.mp4 367.1 kB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-2-outputdebugstringa.mp4 4.8 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-3-file-system.mp4 4.0 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-4-proclist.mp4 2.7 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-5-apicall.mp4 4.1 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-6-fuzz.mp4 7.9 MB
  • pdfAlexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender.pdf 41.6 MB
  • mp4Alfonso Garcia and Alejo Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_1.mp4 1.6 MB
  • mp4Alfonso Garcia and Alejo Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_2.mp4 1.9 MB
  • mp4Alfonso Garcia and Alejo Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_3.mp4 1.1 MB
  • pdfAlfonso Garcia and Alejo Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story-Updated.pdf 4.8 MB
  • mp4Andrea Marcelli/DEFCON-26-Andrea-Marcelli-Demo-Video.mp4 2.4 MB
  • pdfAndrea Marcelli/DEFCON-26-Andrea-Marcelli-Looking-for-the-perfect-signature-automatic-YARA-rules.pdf 4.3 MB
  • pdfBai Zheng and Chai Wang/DEFCON-26-Bai-Zheng-Chai-Wang-You-May-Have-Paid-more-than-You-Imagine.pdf 9.7 MB
  • pdfChristopher Domas/DEFCON-26-Christopher-Domas-GOD-MODE- UNLOCKED-hardware-backdoors-in-x86-CPUs.pdf 8.0 MB
  • pdfChristopher Domas/DEFCON-26-Christopher-Domas-The-Ring-0-Facade.pdf 3.9 MB
  • pdfDEFCON-26-Alex-Levinson-Overview-of-Genesis-Scripting-Engine.pdf 9.2 MB
  • pdfDEFCON-26-Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses-Updated.pdf 1.6 MB
  • pdfDEFCON-26-Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses.pdf 5.4 MB
  • pdfDEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story.pdf 2.5 MB
【文档书籍】 Karim Baggili Quartet - Cuatro con Cuatro (2005) [FLAC]
收录时间:2018-06-26 文档个数:16 文档大小:349.7 MB 最近下载:2025-05-15 人气:984 磁力链接
  • pdfcovers/digipack.pdf 54.1 MB
  • flac07. Incertitude.flac 40.7 MB
  • flac08. Mr Lee 2, Be water my friend.flac 40.7 MB
  • flac06. La llorona.flac 35.5 MB
  • flac01. Septime.flac 33.6 MB
  • flac03. Zayak.flac 32.0 MB
  • flac04. Mr Lee.flac 30.5 MB
  • flac09. Nasreddine.flac 29.0 MB
  • flac05. Cuatro con cuatro.flac 27.5 MB
  • flac02. Taxim.flac 13.1 MB
  • pdfcovers/disc.pdf 6.3 MB
  • jpgcover.jpg 4.1 MB
  • jpgcovers/Karim Baggili Quartet3.jpg 2.5 MB
  • jpgcovers/Karim Baggili Quartet2.jpg 65.9 kB
  • jpgcovers/Karim Baggili Quartet1.jpg 40.7 kB
  • logaudiochecker.log 641 Bytes
【文档书籍】 Rutas con esquís Pirineo Aragonés - Tomos 3 y 4 - Jorge García-Dihinx Villanova.pdf
收录时间:2018-02-13 文档个数:1 文档大小:599.7 MB 最近下载:2025-01-14 人气:279 磁力链接
  • pdfRutas con esquís Pirineo Aragonés - Tomos 3 y 4 - Jorge García-Dihinx Villanova.pdf 599.7 MB
【文档书籍】 DEF CON 25 presentations
收录时间:2017-08-22 文档个数:202 文档大小:1.1 GB 最近下载:2025-05-15 人气:1448 磁力链接
  • pdfDimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf 74.5 MB
  • pdf5A1F/DEFCON-25-5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects.pdf 11.2 MB
  • pdfAlvaro Munoz and Oleksandr Mirosh - UPDATED/DEFCON-25-Alvaro-Munoz-and-Oleksandr-Mirosh-JSON-Attacks-UPDATED.pdf 19.7 MB
  • pdfAlvaro Munoz and Oleksandr Mirosh - UPDATED/DEFCON-25-Alvaro-Munoz-JSON-attacks-WP-UPDATED.pdf 680.9 kB
  • pdfCheng Lei/DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus-WP.pdf 1.3 MB
  • pdfCheng Lei/DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus.pdf 1.7 MB
  • pdfCooper Quintin and Kashmir Hill - UPDATED/DEFCON-25-Cooper-Quintin-and-Kashmir-Hill-The-Internet-Already-Knows-Im-Pregnant-UPDATED.pdf 4.1 MB
  • pdfCooper Quintin and Kashmir Hill - UPDATED/DEFCON-25-Cooper-Quintin-The-Pregnancy-Panopticon-WP-UPDATED.pdf 646.4 kB
  • pdfDEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf 5.9 MB
  • pdfDEFCON-25-0ctane-Untrustworthy-Hardware.pdf 2.5 MB
  • pdfDEFCON-25-Alvaro-Munoz-JSON-attacks.pdf 1.9 MB
  • pdfDEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf 3.1 MB
  • pdfDEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation-UPDATED.pdf 7.3 MB
  • pdfDEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf 2.7 MB
  • pdfDEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf 3.3 MB
  • pdfDEFCON-25-Brown-and-Latimer-Game-of-Drones-Drone-Defense-Market-UPDATED.pdf 31.4 MB
  • pdfDEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf 4.5 MB
  • pdfDEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre-UPDATED.pdf 44.7 MB
  • pdfDEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf 5.3 MB
  • pdfDEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes-UPDATED.pdf 7.0 MB
【文档书籍】 DEF CON 25 presentations
收录时间:2017-08-10 文档个数:198 文档大小:1.1 GB 最近下载:2025-05-15 人气:1210 磁力链接
  • pdfDimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf 74.5 MB
  • pdfDEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf 2.0 MB
  • pdfDEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf 1.7 MB
  • pdfDEFCON-25-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation-UPDATED.pdf 5.8 MB
  • pdfDEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf 2.3 MB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject.pdf 847.8 kB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject-WP.pdf 1.5 MB
  • pdfDEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf 6.4 MB
  • pdfDEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware-UPDATED.pdf 3.5 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf 2.1 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf 1.2 MB
  • pdfDEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf 3.1 MB
  • pdfDEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf 2.7 MB
  • pdfDEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security-UPDATED.pdf 1.4 MB
  • pdfDEFCON-25-Professor-Plum-Digital-Vengeance-Exploiting-Notorious-Toolkits-UPDATED.pdf 7.2 MB
  • pdfMatt Knight and Marc Newlin - UPDATED/DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-UPDATED.pdf 26.8 MB
  • pdfMatt Knight and Marc Newlin - UPDATED/DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP-UPDATED.pdf 128.0 kB
  • pdfDEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf 256.0 kB
  • pdfDEFCON-25-Matt-Joyce-Amateur-Digital-Archeology-UPDATED.pdf 60.0 MB
  • pdfDEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist-UPDATED.pdf 5.8 MB
【文档书籍】 Hna Bernarda. Delicias con queso.pdf
收录时间:2017-08-04 文档个数:1 文档大小:80.3 MB 最近下载:2025-03-19 人气:50 磁力链接
  • pdfHna Bernarda. Delicias con queso.pdf 80.3 MB
【文档书籍】 DEF CON 25 presentations
收录时间:2017-08-01 文档个数:130 文档大小:501.3 MB 最近下载:2024-10-31 人气:698 磁力链接
  • pdfDimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf 74.5 MB
  • pdfDEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf 2.0 MB
  • pdfDEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf 1.7 MB
  • pdfDEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf 2.3 MB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject.pdf 847.8 kB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject-WP.pdf 1.5 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf 2.1 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf 1.2 MB
  • pdfDEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf 3.1 MB
  • pdfDEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf 2.7 MB
  • pdfDEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf 256.0 kB
  • pdfDEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf 5.8 MB
  • pdfDEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf 2.3 MB
  • pdfDEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf 5.3 MB
  • pdfDEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf 4.5 MB
  • pdfDEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf 1.9 MB
  • pdfDEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf 2.0 MB
  • pdfMark Newlin Logan Lamb and Christopher Grayson/DEFCON-25-Newlin-Lamb-Grayson-CableTap-Wirelessly-Tapping-Your-Home-Network.pdf 3.9 MB
  • pdfDEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf 5.1 MB
  • pdfMatt Suiche/DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-WP.pdf 317.7 kB
【文档书籍】 DEF CON 25 presentations
收录时间:2017-07-28 文档个数:128 文档大小:491.6 MB 最近下载:2025-03-02 人气:572 磁力链接
  • pdfDimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf 74.5 MB
  • pdfDEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf 1.7 MB
  • pdfDEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf 2.3 MB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject.pdf 847.8 kB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject-WP.pdf 1.5 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf 2.1 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf 1.2 MB
  • pdfDEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf 3.1 MB
  • pdfDEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf 2.7 MB
  • pdfDEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf 256.0 kB
  • pdfDEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf 5.8 MB
  • pdfDEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf 5.3 MB
  • pdfDEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf 4.5 MB
  • pdfDEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf 1.9 MB
  • pdfDEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf 2.0 MB
  • pdfMark Newlin Logan Lamb and Christopher Grayson/DEFCON-25-Newlin-Lamb-Grayson-CableTap-Wirelessly-Tapping-Your-Home-Network.pdf 3.9 MB
  • pdfDEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf 5.1 MB
  • pdfMatt Suiche/DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-WP.pdf 317.7 kB
  • pdfMatt Suiche/DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts.pdf 6.4 MB
  • pdfDEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf 7.0 MB
【文档书籍】 Il.Gatto.Con.Gli.Stivali.La.Storia.Con.Immaggini.Del.Film.2011.ZDC.pdf
收录时间:2017-05-21 文档个数:1 文档大小:116.2 MB 最近下载:2025-05-14 人气:457 磁力链接
  • pdfIl.Gatto.Con.Gli.Stivali.La.Storia.Con.Immaggini.Del.Film.2011.ZDC.pdf 116.2 MB
【文档书籍】 DEF CON 24 presentations
收录时间:2017-05-09 文档个数:225 文档大小:985.9 MB 最近下载:2025-05-15 人气:481 磁力链接
  • pdfDEFCON-24-Ang-Cui-and-Jatin-Kataria-A-Monitor-Darkly-UPDATED.pdf 142.7 MB
  • pdfDEFCON-24-Mike-Rich-Use-Their-Machines-Against-Them-WP.pdf 1.3 MB
  • pdfDEFCON-24-Patrick-Wardle-99-Problems-Little-Snitch.pdf 14.9 MB
  • pdfDEFCON-24-Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle.pdf 1.3 MB
  • pdfDEFCON-24-Hecker-Hacking-Hotel-Keys-and-PoS-Systems-UPDATED.pdf 2.4 MB
  • pdfDEFCON-24-Fasel-Jacobs-I-fight-for-the-users-UPDATED.pdf 127.8 MB
  • pdfDEFCON-24-Panel-How-To-Make-A-DEFCON-Black-Badge.pdf 2.9 MB
  • pdfDEFCON-24-Adam-Donenfeld-Stumping-The-Mobile-Chipset-UPDATED.pdf 4.4 MB
  • pdfDEFCON-24-Radia-Perlman-Resilience-Despite-Malicious-Pariticpants.pdf 763.2 kB
  • pdfDEFCON-24-Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle-UPDATED.pdf 4.6 MB
  • pdfDEFCON-24-Anto-Joseph-Fuzzing-Android-Devices.pdf 31.7 MB
  • pdfDEFCON-24-Ladar-Levison-Compelled-Decryption.pdf 6.1 MB
  • pdfDEFCON-24-Tamas-Szakaly-Help-I-got-ANTS.pdf 6.0 MB
  • pdfDEFCON-24-Tim-Estell-Katea-Murray-NPRE-Eavesdropping-on-the-Machines.pdf 1.3 MB
  • pdfDEFCON-24-Benjamin-Holland-Developing-Managed-Code-Rootkits-For-Java-Runtime.pdf 722.0 kB
  • pdfDEFCON-24-Forgety-Kreilein-Ng9-1-1-The-Next-Gene-Of-Emergency-Ph0Nage.pdf 3.4 MB
  • pyDEFCON-24-Amro-Abdelgawad-Extras/sample3_isDebugged2.py 15.7 kB
  • pyDEFCON-24-Amro-Abdelgawad-Extras/sample1_CPUID.py 15.7 kB
  • pyDEFCON-24-Amro-Abdelgawad-Extras/rmengine_client.py 1.9 kB
  • pyDEFCON-24-Amro-Abdelgawad-Extras/rmengine_CPUID.py 16.2 kB
共4页 上一页 1 2 3 4 下一页