磁力管家

磁力管家
为您索检到30条磁力链接,耗时6毫秒。 rss

分享给好友

【文档书籍】 DEF CON 22 presentations
收录时间:2017-02-10 文档个数:180 文档大小:1.2 GB 最近下载:2025-05-15 人气:754 磁力链接
  • pdfGene Bransfeild - Updated/DEFCON-22-Gene-Bransfield-Weaponizing-your-Pets-UPDATED.pdf 65.2 MB
  • pdfCeline and Elie Bursztein - Updated/DEFCON-22-Celine-and-Elie-Bursztein-I-am-a-legend-UPDATED.pdf 51.7 MB
  • pdfWill Schroeder/DEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf 51.2 MB
  • pdfDominic White and Ian de Villiers - Updated/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-onscreen-Updated.pdf 51.0 MB
  • pdfDhia Mahjoub, Andree Toonk, and Thibault Reuille - Updated/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf 46.9 MB
  • pdfLadar Levison and Stephen Watt - Updated/DEFCON-22-Levison-Watt-Dark-Mail-UPDATED.pdf 39.3 MB
  • pdfJoe Fitzpatrick and Miles Crabill - Updated/DEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe-UPDATED.pdf 38.3 MB
  • pdfHeres, Etemadieh, Baker and Nielsen - Updated/DEFCON-22-Heres-Etemadieh-Baker-Nielsen-Hack-All-The-Things-UPDATED.pdf 37.4 MB
  • zipJesse Michael and Mickey Shkatov - Updated/Jesse Michael and Mickey Shkatov - Extras.zip 36.3 MB
  • pdfFatih Ozavci - Updated/DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones-UPDATED.pdf 35.4 MB
  • pdfColby Moore and Patrick Wardle - Updated/DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam-Updated.pdf 31.6 MB
  • pdfDominic White and Ian de Villiers - Updated/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdf 31.6 MB
  • pdfKenneth White and Matthew Green - Updated/DEFCON-22-Kenneth-White-and-Matthew-Green-The-Open-Crypto-Audit-Project-Updated.pdf 31.5 MB
  • pdfAndrew Hunt - Updated/DEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise-UPDATED.pdf 27.6 MB
  • zipBrian Gorenc and Matt Molinyawe -Updated/Brian Gorenc and Matt Molinyawe - Extras.zip 27.4 MB
  • pdfGlenn Wilkinson - Updated/DEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance-UPDATED.pdf 27.2 MB
  • pdfRmellendick and DaKahuna - Updated/DEFCON-22-Rmellendick-Dakahuna-RF-Penetration-Testing-Your-Air-Stinks-UPDATED.pdf 26.3 MB
  • pdfPhil Polstra - Updated/DEFCON-22-Phil-Polstra-Am-I-Being-Spied-On-Updated.pdf 23.3 MB
  • pdfBrian Gorenc and Matt Molinyawe -Updated/DEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly-UPDATED.pdf 20.8 MB
  • pdfZoz - Updated/DEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdf 20.1 MB
【文档书籍】 DEF CON 24 Original Hacking Conference CD
收录时间:2017-02-14 文档个数:323 文档大小:505.7 MB 最近下载:2024-11-28 人气:943 磁力链接
  • pdfWorkshop Materials/DEFCON-24-Workshop-Craig-Young-Brainwashing-Embedded-Systems.pdf 59.1 MB
  • pdfDEFCON-24-Program.pdf 20.3 MB
  • pdfDEFCON-24-Receipt.pdf 13.1 MB
  • rarExtras/1o57/1o57.rar 2.7 MB
  • txtExtras/1o57/Origin-Story.txt 22.6 kB
  • nfoExtras/DARPA CGC/DEFCON-24-DARPA-CGC.nfo 848 Bytes
  • txtExtras/DEF CON 24 Short Story Contest/DEFCON-24-Anna-L-Davis-Childs-Play.txt 11.4 kB
  • txtExtras/DEF CON 24 Short Story Contest/DEFCON-24-Avi-Zajac-Alice.txt 33.7 kB
  • txtExtras/DEF CON 24 Short Story Contest/DEFCON-24-Chad-Walker-The-Father-Of-Space-And-Time.txt 16.4 kB
  • txtExtras/DEF CON 24 Short Story Contest/DEFCON-24-Chris-Austin-Techgirlmn-A-Letter-From-Mom.txt 7.5 kB
  • txtExtras/DEF CON 24 Short Story Contest/DEFCON-24-Elkentaro-Thedarkreboot.txt 51.1 kB
  • txtExtras/DEF CON 24 Short Story Contest/DEFCON-24-Gtwgn-Untitled.txt 9.0 kB
  • txtExtras/DEF CON 24 Short Story Contest/DEFCON-24-J4Ckh4Mmer-DEFCON-Z.txt 26.7 kB
  • txtExtras/DEF CON 24 Short Story Contest/DEFCON-24-John-Mcnabb-Turings-Wager.txt 26.3 kB
  • txtExtras/DEF CON 24 Short Story Contest/DEFCON-24-Leah-Thompson-Thebackup.txt 22.5 kB
  • txtExtras/DEF CON 24 Short Story Contest/DEFCON-24-Liz-Farrel-Lelands-Angels.txt 19.4 kB
  • txtExtras/DEF CON 24 Short Story Contest/DEFCON-24-Matthew-Yeager-Origami.txt 11.4 kB
  • txtExtras/DEF CON 24 Short Story Contest/DEFCON-24-Rob-Pait-The-Great-Debate.txt 14.8 kB
  • txtExtras/DEF CON 24 Short Story Contest/DEFCON-24-Samantha-C-Noticed.txt 50.9 kB
  • txtExtras/DEF CON 24 Short Story Contest/DEFCON-24-Synshop-Magicdave-Cohort.txt 45.3 kB
【文档书籍】 DEF CON Conference Programs
收录时间:2017-02-28 文档个数:22 文档大小:615.1 MB 最近下载:2025-04-20 人气:497 磁力链接
  • pdfDEFCON-14-Program.pdf 285.6 MB
  • pdfDEFCON-06-Program.pdf 56.8 MB
  • pdfDEFCON-22-Program.pdf 43.2 MB
  • pdfDEFCON-02-Program.pdf 42.1 MB
  • pdfDEFCON-08-Program.pdf 33.3 MB
  • pdfDEFCON-20-Program.pdf 31.5 MB
  • pdfDEFCON-09-Program.pdf 21.2 MB
  • pdfDEFCON-19-Program.pdf 19.9 MB
  • pdfDEFCON-21-program.pdf 15.3 MB
  • pdfDEFCON-18-Program.pdf 11.1 MB
  • pdfDEFCON-15-Program.pdf 7.6 MB
  • pdfDEFCON-17-Program.pdf 6.3 MB
  • pdfDEFCON-13-Program.pdf 6.3 MB
  • pdfDEFCON-04-Program.pdf 5.7 MB
  • pdfDEFCON-11-Program.pdf 5.3 MB
  • pdfDEFCON-10-Program.pdf 4.9 MB
  • pdfDEFCON-16-Program.pdf 4.7 MB
  • pdfDEFCON-07-Program.pdf 4.3 MB
  • pdfDEFCON-05-Program.pdf 3.0 MB
  • pdfDEFCON-12-Program.pdf 2.9 MB
【文档书籍】 DEF CON 24 presentations
收录时间:2017-03-09 文档个数:227 文档大小:991.7 MB 最近下载:2024-08-13 人气:1107 磁力链接
  • pdfDEFCON-24-Ang-Cui-and-Jatin-Kataria-A-Monitor-Darkly-UPDATED.pdf 142.7 MB
  • pdfDEFCON-24-Demay-CANSPY-a-Platorm-For-Auditing-CAN-Devices-WP-UPDATED.pdf 838.2 kB
  • pdfDEFCON-24-Tom-Kopchak-Sentient-Storage.pdf 1.6 MB
  • pdfDEFCON-24-Aaron-Luo-Drones-Hijacking-Multi-Dimensional-Attack-Vectors-And-Countermeasures-UPDATED.pdf 4.8 MB
  • pdfDEFCON-24-Guevara-Noubir-Amirali-Sanatinia-Honey-Onions-Exposing-Snooping-Tor-Hsdir-Relays.pdf 1.7 MB
  • pdfDEFCON-24-Chris-Rock-How-to-overthrow-a-Government-Kuwait-Coup-WP.pdf 236.9 kB
  • pdfDEFCON-24-Demay-CANSPY-a-Platorm-For-Auditing-CAN-Devices-UPDATED.pdf 1.8 MB
  • pdfDEFCON-24-Shane-Steiger-Maelstrom-Are-You-Playing-With-A-Full-Deck-UPDATED.pdf 8.7 MB
  • pdfDEFCON-24-Maldonado-Mcguffin-Sticky-Keys-To-The-Kingdom.pdf 850.9 kB
  • pdfDEFCON-24-Wesley-McGrew-Secure-Penetration-Testing-Operations-WP.pdf 128.6 kB
  • pdfDEFCON-24-Adam-Donenfeld-Stumping-The-Mobile-Chipset.pdf 2.8 MB
  • pdfDEFCON-24-Jmaxxz-Backdooring-the-Frontdoor-UPDATED.pdf 1.7 MB
  • pdfDEFCON-24-Mike-Rich-Use-Their-Machines-Against-Them-WP.pdf 1.3 MB
  • pdfDEFCON-24-Thomas-Wilhelm-Hacking-Network-Protocols-Using-Kali.pdf 599.1 kB
  • pdfDEFCON-24-Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection-Writeup.pdf 3.2 MB
  • pdfDEFCON-24-Regilero-Hiding-Wookiees-In-Http.pdf 420.0 kB
  • DEFCON-24-Seymour-Tully-Extras/auto-phish/LICENSEDEFCON-24-Seymour-Tully-Extras/auto-phish/LICENSE 1.6 kB
  • pyDEFCON-24-Seymour-Tully-Extras/auto-phish/credentials.py 283 Bytes
  • pyDEFCON-24-Seymour-Tully-Extras/auto-phish/cluster.py 9.4 kB
  • mdDEFCON-24-Seymour-Tully-Extras/auto-phish/Readme.md 1.7 kB
【文档书籍】 DEF CON 21 presentations
收录时间:2017-03-15 文档个数:426 文档大小:896.6 MB 最近下载:2025-05-12 人气:467 磁力链接
  • pdfAng Cui and Micheal Costello-Updated/DEFCON-21-Cui-Costello-Stepping-P3wns-Updated.pdf 102.7 MB
  • pdfBalint Seeber/DEFCON-21-Balint-Seeber-All-Your-RFz-Are-Belong-to-Me.pdf 71.7 MB
  • pdfEtemadieh and Panel/DEFCON-21-Etemadieh-Panel-Google-TV-Secure-Boot-Exploit-GTVHacker.pdf 32.1 MB
  • pdfBrendan O'Connor-Updated/DEFCON-21-OConnor-Stalking-a-City-for-Fun-and-Frivolity-Updated.pdf 31.4 MB
  • pdfBrendan O'Connor-Updated/DEFCON-21-OConnor-Stalking-a-City-for-Fun-and-Frivolity.pdf 27.9 MB
  • pdfsoen-Updated_/DEFCON-21-soen-Evolving-Exploits-Through-Genetic-Algorithms-Updated.pdf 25.2 MB
  • mp4Pukingmonkey-Updated/Extras/DEFCON-21-05ezpassdetectortimessquaretomsgin90seconds-(1).mp4 22.0 MB
  • mp4Pukingmonkey-Updated/Extras/DEFCON-21-05ezpassdetectortimessquaretomsgin90seconds.mp4 22.0 MB
  • pdfChris John Riley-Updated/DEFCON-21-Riley-Defense-by-Numbers-Updated.pdf 21.9 MB
  • pdfsoen-Updated_/DEFCON-21-soen-Evolving-Exploits-Through-Genetic-Algorithms.pdf 21.5 MB
  • pdfChris John Riley-Updated/DEFCON-21-Riley-Defense-by-Numbers.pdf 21.3 MB
  • pdfTom Keenan/DEFCON-21-Tom-Keenan-Torturing-Open-Government-Systems-for-Fun.pdf 18.9 MB
  • mp4Pukingmonkey-Updated/Updated Extras/slide103-times-square-to-msg.mp4 17.8 MB
  • pdfPukingmonkey-Updated/DEFCON-21-Pukingmonkey-The-Road-Less-Surreptitiously-Traveled.pdf 16.2 MB
  • pdfm0nk-Updated/DEFCON-21-m0nk-BoutiqueKit-Updated.pdf 16.0 MB
  • pdfPhorkus and Evilrob/DEFCON-21-Phorkus-Evilrob-Hacking-Embedded-Devices-Bad-things-to-Good-hardware.pdf 15.8 MB
  • pdfPukingmonkey-Updated/DEFCON-21-Pukingmonkey-The-Road-Less-Surreptitiously-Traveled-Updated.pdf 14.4 MB
  • pdfJason Scott and Rachel Lovinger-Updated/DEFCON-21-Scott and Lovinger-Making-the-DEFCON-doc.pdf 13.3 MB
  • pdfJohn Ortiz/DEFCON-21-Ortiz-Fast-Forensics-Using-Simple-Statistics-and-Cool-Tools.pdf 11.6 MB
  • pdfComedy-Jam/DEFCON-21-Panel-Comedy-Jam-Fail-Panel-Updated.pdf 11.1 MB
【文档书籍】 Ross Halfin - Def Leppard The Definitive Visual History - 2011
收录时间:2017-03-24 文档个数:2 文档大小:146.0 MB 最近下载:2024-05-20 人气:110 磁力链接
  • pdfRoss Halfin - Def Leppard The Definitive Visual History - 2011.pdf 146.0 MB
  • nfoRoss Halfin - Def Leppard The Definitive Visual History - 2011.nfo 1.1 kB
【文档书籍】 DEF CON 24 presentations
收录时间:2017-05-09 文档个数:225 文档大小:985.9 MB 最近下载:2025-05-15 人气:481 磁力链接
  • pdfDEFCON-24-Ang-Cui-and-Jatin-Kataria-A-Monitor-Darkly-UPDATED.pdf 142.7 MB
  • pdfDEFCON-24-Mike-Rich-Use-Their-Machines-Against-Them-WP.pdf 1.3 MB
  • pdfDEFCON-24-Patrick-Wardle-99-Problems-Little-Snitch.pdf 14.9 MB
  • pdfDEFCON-24-Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle.pdf 1.3 MB
  • pdfDEFCON-24-Hecker-Hacking-Hotel-Keys-and-PoS-Systems-UPDATED.pdf 2.4 MB
  • pdfDEFCON-24-Fasel-Jacobs-I-fight-for-the-users-UPDATED.pdf 127.8 MB
  • pdfDEFCON-24-Panel-How-To-Make-A-DEFCON-Black-Badge.pdf 2.9 MB
  • pdfDEFCON-24-Adam-Donenfeld-Stumping-The-Mobile-Chipset-UPDATED.pdf 4.4 MB
  • pdfDEFCON-24-Radia-Perlman-Resilience-Despite-Malicious-Pariticpants.pdf 763.2 kB
  • pdfDEFCON-24-Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle-UPDATED.pdf 4.6 MB
  • pdfDEFCON-24-Anto-Joseph-Fuzzing-Android-Devices.pdf 31.7 MB
  • pdfDEFCON-24-Ladar-Levison-Compelled-Decryption.pdf 6.1 MB
  • pdfDEFCON-24-Tamas-Szakaly-Help-I-got-ANTS.pdf 6.0 MB
  • pdfDEFCON-24-Tim-Estell-Katea-Murray-NPRE-Eavesdropping-on-the-Machines.pdf 1.3 MB
  • pdfDEFCON-24-Benjamin-Holland-Developing-Managed-Code-Rootkits-For-Java-Runtime.pdf 722.0 kB
  • pdfDEFCON-24-Forgety-Kreilein-Ng9-1-1-The-Next-Gene-Of-Emergency-Ph0Nage.pdf 3.4 MB
  • pyDEFCON-24-Amro-Abdelgawad-Extras/sample3_isDebugged2.py 15.7 kB
  • pyDEFCON-24-Amro-Abdelgawad-Extras/sample1_CPUID.py 15.7 kB
  • pyDEFCON-24-Amro-Abdelgawad-Extras/rmengine_client.py 1.9 kB
  • pyDEFCON-24-Amro-Abdelgawad-Extras/rmengine_CPUID.py 16.2 kB
【文档书籍】 DEF CON 25 presentations
收录时间:2017-07-28 文档个数:128 文档大小:491.6 MB 最近下载:2025-03-02 人气:572 磁力链接
  • pdfDimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf 74.5 MB
  • pdfDEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf 1.7 MB
  • pdfDEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf 2.3 MB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject.pdf 847.8 kB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject-WP.pdf 1.5 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf 2.1 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf 1.2 MB
  • pdfDEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf 3.1 MB
  • pdfDEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf 2.7 MB
  • pdfDEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf 256.0 kB
  • pdfDEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf 5.8 MB
  • pdfDEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf 5.3 MB
  • pdfDEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf 4.5 MB
  • pdfDEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf 1.9 MB
  • pdfDEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf 2.0 MB
  • pdfMark Newlin Logan Lamb and Christopher Grayson/DEFCON-25-Newlin-Lamb-Grayson-CableTap-Wirelessly-Tapping-Your-Home-Network.pdf 3.9 MB
  • pdfDEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf 5.1 MB
  • pdfMatt Suiche/DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-WP.pdf 317.7 kB
  • pdfMatt Suiche/DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts.pdf 6.4 MB
  • pdfDEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf 7.0 MB
【文档书籍】 DEF CON 25 presentations
收录时间:2017-08-01 文档个数:130 文档大小:501.3 MB 最近下载:2024-10-31 人气:698 磁力链接
  • pdfDimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf 74.5 MB
  • pdfDEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf 2.0 MB
  • pdfDEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf 1.7 MB
  • pdfDEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf 2.3 MB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject.pdf 847.8 kB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject-WP.pdf 1.5 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf 2.1 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf 1.2 MB
  • pdfDEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf 3.1 MB
  • pdfDEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf 2.7 MB
  • pdfDEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf 256.0 kB
  • pdfDEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf 5.8 MB
  • pdfDEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf 2.3 MB
  • pdfDEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf 5.3 MB
  • pdfDEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf 4.5 MB
  • pdfDEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf 1.9 MB
  • pdfDEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf 2.0 MB
  • pdfMark Newlin Logan Lamb and Christopher Grayson/DEFCON-25-Newlin-Lamb-Grayson-CableTap-Wirelessly-Tapping-Your-Home-Network.pdf 3.9 MB
  • pdfDEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf 5.1 MB
  • pdfMatt Suiche/DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-WP.pdf 317.7 kB
【文档书籍】 DEF CON 25 presentations
收录时间:2017-08-10 文档个数:198 文档大小:1.1 GB 最近下载:2025-05-15 人气:1210 磁力链接
  • pdfDimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf 74.5 MB
  • pdfDEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf 2.0 MB
  • pdfDEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf 1.7 MB
  • pdfDEFCON-25-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation-UPDATED.pdf 5.8 MB
  • pdfDEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf 2.3 MB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject.pdf 847.8 kB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject-WP.pdf 1.5 MB
  • pdfDEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf 6.4 MB
  • pdfDEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware-UPDATED.pdf 3.5 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf 2.1 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf 1.2 MB
  • pdfDEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf 3.1 MB
  • pdfDEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf 2.7 MB
  • pdfDEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security-UPDATED.pdf 1.4 MB
  • pdfDEFCON-25-Professor-Plum-Digital-Vengeance-Exploiting-Notorious-Toolkits-UPDATED.pdf 7.2 MB
  • pdfMatt Knight and Marc Newlin - UPDATED/DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-UPDATED.pdf 26.8 MB
  • pdfMatt Knight and Marc Newlin - UPDATED/DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP-UPDATED.pdf 128.0 kB
  • pdfDEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf 256.0 kB
  • pdfDEFCON-25-Matt-Joyce-Amateur-Digital-Archeology-UPDATED.pdf 60.0 MB
  • pdfDEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist-UPDATED.pdf 5.8 MB
【文档书籍】 DEF CON 25 presentations
收录时间:2017-08-22 文档个数:202 文档大小:1.1 GB 最近下载:2025-05-15 人气:1448 磁力链接
  • pdfDimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf 74.5 MB
  • pdf5A1F/DEFCON-25-5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects.pdf 11.2 MB
  • pdfAlvaro Munoz and Oleksandr Mirosh - UPDATED/DEFCON-25-Alvaro-Munoz-and-Oleksandr-Mirosh-JSON-Attacks-UPDATED.pdf 19.7 MB
  • pdfAlvaro Munoz and Oleksandr Mirosh - UPDATED/DEFCON-25-Alvaro-Munoz-JSON-attacks-WP-UPDATED.pdf 680.9 kB
  • pdfCheng Lei/DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus-WP.pdf 1.3 MB
  • pdfCheng Lei/DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus.pdf 1.7 MB
  • pdfCooper Quintin and Kashmir Hill - UPDATED/DEFCON-25-Cooper-Quintin-and-Kashmir-Hill-The-Internet-Already-Knows-Im-Pregnant-UPDATED.pdf 4.1 MB
  • pdfCooper Quintin and Kashmir Hill - UPDATED/DEFCON-25-Cooper-Quintin-The-Pregnancy-Panopticon-WP-UPDATED.pdf 646.4 kB
  • pdfDEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf 5.9 MB
  • pdfDEFCON-25-0ctane-Untrustworthy-Hardware.pdf 2.5 MB
  • pdfDEFCON-25-Alvaro-Munoz-JSON-attacks.pdf 1.9 MB
  • pdfDEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf 3.1 MB
  • pdfDEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation-UPDATED.pdf 7.3 MB
  • pdfDEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf 2.7 MB
  • pdfDEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf 3.3 MB
  • pdfDEFCON-25-Brown-and-Latimer-Game-of-Drones-Drone-Defense-Market-UPDATED.pdf 31.4 MB
  • pdfDEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf 4.5 MB
  • pdfDEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre-UPDATED.pdf 44.7 MB
  • pdfDEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf 5.3 MB
  • pdfDEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes-UPDATED.pdf 7.0 MB
【文档书籍】 DJ Def Chad - The Black Holocaust
收录时间:2018-05-18 文档个数:20 文档大小:184.8 MB 最近下载:2024-05-21 人气:5 磁力链接
  • pdf2014 - DJ Def Chad - The Black Holocaust/00 - Book.pdf 19.8 MB
  • mp32014 - DJ Def Chad - The Black Holocaust/15 - Breathin Thru My Peoples (Featuring Dre' Leez).mp3 16.4 MB
  • mp32014 - DJ Def Chad - The Black Holocaust/12 - Master Plan (Featuring C-Doc).mp3 15.0 MB
  • mp32014 - DJ Def Chad - The Black Holocaust/06 - Cain.mp3 15.0 MB
  • mp32014 - DJ Def Chad - The Black Holocaust/08 - SupaNiggaz (Featuring CM aka Creative, Villain151 & Tirade).mp3 12.9 MB
  • mp32014 - DJ Def Chad - The Black Holocaust/11 - Yes Yes Y'all.mp3 12.6 MB
  • mp32014 - DJ Def Chad - The Black Holocaust/07 - The Black Holocaust (Featuring Jamod Allah).mp3 12.3 MB
  • mp32014 - DJ Def Chad - The Black Holocaust/14 - Shawntae.mp3 11.9 MB
  • mp32014 - DJ Def Chad - The Black Holocaust/13 - Breathe Easy.mp3 11.2 MB
  • mp32014 - DJ Def Chad - The Black Holocaust/10 - The Remedy.mp3 10.5 MB
  • mp32014 - DJ Def Chad - The Black Holocaust/05 - The Rebel Youth.mp3 10.2 MB
  • mp32014 - DJ Def Chad - The Black Holocaust/04 - No Use Pretending.mp3 9.3 MB
  • mp32014 - DJ Def Chad - The Black Holocaust/03 - Up and Away (Featuring C-Doc).mp3 8.9 MB
  • mp32014 - DJ Def Chad - The Black Holocaust/02 - Beef.mp3 7.7 MB
  • mp32014 - DJ Def Chad - The Black Holocaust/09 - They Don't Know.mp3 2.8 MB
  • mp32014 - DJ Def Chad - The Black Holocaust/01 - Holocaust.mp3 2.7 MB
  • pdfDJ Def Chad - The Black Holocaust cover/00-BSOG0035-Traycard.pdf 1.6 MB
  • jpg2014 - DJ Def Chad - The Black Holocaust/00 - Cover.jpg 1.6 MB
  • pdfDJ Def Chad - The Black Holocaust cover/00-BSOG0035-Booklet.pdf 1.4 MB
  • pdfDJ Def Chad - The Black Holocaust cover/00-BSOG0035-Disc.pdf 960.6 kB
【文档书籍】 DEF CON 26 presentations
收录时间:2018-08-15 文档个数:1036 文档大小:2.9 GB 最近下载:2025-05-15 人气:450 磁力链接
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-1-mpclient.mp4 367.1 kB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-2-outputdebugstringa.mp4 4.8 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-3-file-system.mp4 4.0 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-4-proclist.mp4 2.7 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-5-apicall.mp4 4.1 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-6-fuzz.mp4 7.9 MB
  • pdfAlexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender.pdf 41.6 MB
  • mp4Alfonso Garcia and Alejo Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_1.mp4 1.6 MB
  • mp4Alfonso Garcia and Alejo Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_2.mp4 1.9 MB
  • mp4Alfonso Garcia and Alejo Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_3.mp4 1.1 MB
  • pdfAlfonso Garcia and Alejo Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story-Updated.pdf 4.8 MB
  • mp4Andrea Marcelli/DEFCON-26-Andrea-Marcelli-Demo-Video.mp4 2.4 MB
  • pdfAndrea Marcelli/DEFCON-26-Andrea-Marcelli-Looking-for-the-perfect-signature-automatic-YARA-rules.pdf 4.3 MB
  • pdfBai Zheng and Chai Wang/DEFCON-26-Bai-Zheng-Chai-Wang-You-May-Have-Paid-more-than-You-Imagine.pdf 9.7 MB
  • pdfChristopher Domas/DEFCON-26-Christopher-Domas-GOD-MODE- UNLOCKED-hardware-backdoors-in-x86-CPUs.pdf 8.0 MB
  • pdfChristopher Domas/DEFCON-26-Christopher-Domas-The-Ring-0-Facade.pdf 3.9 MB
  • pdfDEFCON-26-Alex-Levinson-Overview-of-Genesis-Scripting-Engine.pdf 9.2 MB
  • pdfDEFCON-26-Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses-Updated.pdf 1.6 MB
  • pdfDEFCON-26-Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses.pdf 5.4 MB
  • pdfDEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story.pdf 2.5 MB
【文档书籍】 DEF CON 26 workshops
收录时间:2018-08-28 文档个数:24 文档大小:463.4 MB 最近下载:2025-05-08 人气:488 磁力链接
  • pdfDEFCON-26-Workshop-Adam-Steed-and-James-Albany-Attacking-Active-Directory-and-Advanced-Methods-of-Defense-2018.pdf 7.2 MB
  • pdfDEFCON-26-Workshop-Alexandrine-Torrents-and-Arnaud-Soullie-Pentesting-ICS-101.pdf 5.8 MB
  • pdfDEFCON-26-Workshop-Anto-Joseph-and-Clarance-Chio-Hacking-Thingz-Powered-By-Machine-Learning.pdf 3.8 MB
  • pdfDEFCON-26-Workshop-Arun-Magesh-Buzzing-Smart-Devices.pdf 1.1 MB
  • pdfDEFCON-26-Workshop-Bryce-Kunz-and-Kevin-Lustic-Fuzzing-FTW.pdf 2.7 MB
  • pdfDEFCON-26-Workshop-Dave-Porcello-and-Sean-Gallagher-Packet-Mining-for-Privacy-Leakage.pdf 1.9 MB
  • pdfDEFCON-26-Workshop-David-Pearson-The-Truth-is-in-the-Network_-Reverse-Engineering-Application-Layer-Protocols-Via-PCAP.pdf 314.9 MB
  • pdfDEFCON-26-Workshop-David-Turco-and-Jon-Overgaard-Christiansen-Wheres-My-Browser-Learn-Hacking-iOS-and-Android-WebViews.pdf 5.9 MB
  • pdfDEFCON-26-Workshop-Eijah-Decentralized-Hacker-Net.pdf 1.9 MB
  • pdfDEFCON-26-Workshop-Jakub-Botwicz-and-Wojciech-Rauner-Fuzzing-with-AFL-(American-Fuzzy-Lop).pdf 5.3 MB
  • pdfDEFCON-26-Workshop-Joe-Grand-Build-Your-Own-Opticspy.pdf 14.8 MB
  • pdfDEFCON-26-Workshop-Joe-Grand-Hardware-Hacking-Basics.pdf 4.4 MB
  • pdfDEFCON-26-Workshop-Joshua-Pereyda-and-Timothy-Clemans-Advanced-Custom-Network-Protocol-Fuzzing.pdf 349.2 kB
  • pdfDEFCON-26-Workshop-Louis-Nyfenegger-and-Luke-Jahnke-Finding-Needles-in-Haystacks.pdf 5.3 MB
  • pdfDEFCON-26-Workshop-Louis-Nyfenegger-and-Luke-Jahnke-JWAT-Attacking-JSON-WEB-TOKENS.pdf 6.6 MB
  • pdfDEFCON-26-Workshop-Matt-Cheung-Introduction-to-Cryptographic-Attacks.pdf 1.7 MB
  • pdfDEFCON-26-Workshop-Mike-Guirao-Securing-Big-Data-in-Hadoop.pdf 14.0 MB
  • pdfDEFCON-26-Workshop-Nick-Tait-Reverse-Engineering-with-OpenSCAD-and-3D-Printing.pdf 53.7 MB
  • pdfDEFCON-26-Workshop-Sneha-Rajguru-ARM-eXploitation-101.pdf 1.7 MB
  • pdfDEFCON-26-Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID/DEFCON-26-Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID-Theory.pdf 1.6 MB
【文档书籍】 DEF CON 26 presentations
收录时间:2018-09-21 文档个数:696 文档大小:3.8 GB 最近下载:2025-05-15 人气:318 磁力链接
  • pdf0x200b/DEFCON-26-0x200b-Detecting-Blue-Team-Research-Through-Targeted-Ads-Updated.pdf 1.3 MB
  • pdfAlex Levinson/DEFCON-26-Alex-Levinson-Overview-of-Genesis-Scripting-Engine.pdf 9.2 MB
  • pdfAlexandre Borges - Updated/DEFCON-26-Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses-Updated.pdf 5.9 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-1-mpclient.mp4 367.1 kB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-2-outputdebugstringa.mp4 4.8 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-3-file-system.mp4 4.0 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-4-proclist.mp4 2.7 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-5-apicall.mp4 4.1 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-6-fuzz.mp4 7.9 MB
  • pdfAlexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Updated.pdf 42.0 MB
  • mp4Alfonso Garcia and Alejo Murillo - Updated/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_1.mp4 1.6 MB
  • mp4Alfonso Garcia and Alejo Murillo - Updated/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_2.mp4 1.9 MB
  • mp4Alfonso Garcia and Alejo Murillo - Updated/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_3.mp4 1.1 MB
  • pdfAlfonso Garcia and Alejo Murillo - Updated/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story-Updated.pdf 6.2 MB
  • pdfAmanda Rousseau and Rich Seymour/DEFCON-26-Rousseau-and-Seymour-Finding-Xori-Malware-Analysis-Triage-w-Auto-Disassembly.pdf 1.6 MB
  • pdfAmir Etemadieh - ZenoFex/DEFCON-26-Amir-Etemadieh-Zenofex-Dissecting-Teddy-Ruxpin-Reverse-Engineering-the-Smart Bear.pdf 9.7 MB
  • mp4Andrea Marcelli/DEFCON-26-Andrea-Marcelli-Demo-Video.mp4 2.4 MB
  • pdfAndrea Marcelli/DEFCON-26-Andrea-Marcelli-Looking-for-the-perfect-signature-automatic-YARA-rules.pdf 4.3 MB
  • pdfBai Zheng and Chai Wang/DEFCON-26-Bai-Zheng-Chai-Wang-You-May-Have-Paid-more-than-You-Imagine.pdf 9.7 MB
  • pdfChristopher Domas/DEFCON-26-Christopher-Domas-GOD-MODE-UNLOCKED-hardware-backdoors-in-x86-CPUs.pdf 13.6 MB
【文档书籍】 DEF CON Conference Programs
收录时间:2021-03-08 文档个数:27 文档大小:775.6 MB 最近下载:2025-02-24 人气:46 磁力链接
  • pdfDEF CON 14 program.pdf 285.6 MB
  • pdfDEF CON 26 program.pdf 93.7 MB
  • pdfDEF CON 06 program.pdf 56.8 MB
  • pdfDEF CON 22 program.pdf 43.2 MB
  • pdfDEF CON 02 program.pdf 42.1 MB
  • pdfDEF CON 08 program.pdf 33.3 MB
  • pdfDEF CON 20 program.pdf 31.5 MB
  • pdfDEF CON 09 program.pdf 21.2 MB
  • pdfDEF CON 24 program.pdf 20.3 MB
  • pdfDEF CON 19 program.pdf 19.9 MB
  • pdfDEF CON 25 program.pdf 17.1 MB
  • pdfDEF CON 23 program.pdf 16.8 MB
  • pdfDEF CON 21 program.pdf 15.3 MB
  • pdfDEF CON China beta program.pdf 12.5 MB
  • pdfDEF CON 18 program.pdf 11.1 MB
  • pdfDEF CON 15 program.pdf 7.6 MB
  • pdfDEF CON 17 program.pdf 6.3 MB
  • pdfDEF CON 13 program.pdf 6.3 MB
  • pdfDEF CON 04 program.pdf 5.7 MB
  • pdfDEF CON 11 program.pdf 5.3 MB
【文档书籍】 DEF CON 2
收录时间:2021-03-09 文档个数:102 文档大小:357.0 MB 最近下载:2025-04-19 人气:201 磁力链接
  • pdfDEF CON 2 program.pdf 42.1 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Jackal - Radio Overview - Audio.m4b 24.3 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Steve Dunnifer - Pirate Radio Battling the FCC - Audio.m4b 23.7 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Theora - Privacy and Anonymity on the Internet - Audio.m4b 21.4 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Chris Hall - Private Investigator War Stories - Audio.m4b 19.4 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Dr. Mark Ludwig - Virus Creation Awards - Audio.m4b 18.6 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Winn Schwartau - HERF - Audio.m4b 18.4 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Padgett Peterson - Antivirus Programming - Audio.m4b 18.1 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Gail Thackeray - Privacy Rights - Audio.m4b 17.3 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Damien Thorn - Audio.m4b 16.8 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Phil Zimmermann - PGP Keynote - Audio.m4b 16.3 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Peter Buruk - What the SPA Does - Audio.m4b 16.1 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By White Knight - Illegal FBI wire tap activity - Audio.m4b 15.4 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Judi Clark - Social Elements in Networking - Audio.m4b 14.5 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Mark Lottor - Hacking Cell Phones - Audio.m4b 11.9 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Curtis Karnow - Recombinant Culture - Audio.m4b 11.7 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By The Dark Knight - Hackers in the UK - Audio.m4b 11.1 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Annaliza - European Hacker Scene - Audio.m4b 8.8 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Winn Schwartau - Tempest - Audio.m4b 7.5 MB
  • m4bDEF CON 2 audio/DEF CON 2 Hacking Conference Presentation By Mr. Upsetter and Damien Thorn - Cellular Workshop - Audio.m4b 4.8 MB
【文档书籍】 DEF CON Conference Programs
收录时间:2021-03-25 文档个数:27 文档大小:782.3 MB 最近下载:2025-05-16 人气:293 磁力链接
  • pdfDEFCON-14-Program.pdf 285.6 MB
  • pdfDEFCON-26-Program.pdf 93.7 MB
  • pdfDEFCON-06-Program.pdf 56.8 MB
  • pdfDEFCON-22-Program.pdf 43.2 MB
  • pdfDEFCON-02-Program.pdf 42.1 MB
  • pdfDEFCON-08-Program.pdf 33.3 MB
  • pdfDEFCON-20-Program.pdf 31.5 MB
  • pdfDEFCON-09-Program.pdf 21.2 MB
  • pdfDEFCON-24-Program.pdf 20.3 MB
  • pdfDEFCON-19-Program.pdf 19.9 MB
  • pdfDEF CON 24 Program.pdf 19.3 MB
  • pdfDEFCON-25-Program.pdf 17.1 MB
  • pdfDEFCON-23-Program.pdf 16.8 MB
  • pdfDEFCON-21-program.pdf 15.3 MB
  • pdfDEFCON-18-Program.pdf 11.1 MB
  • pdfDEFCON-15-Program.pdf 7.6 MB
  • pdfDEFCON-17-Program.pdf 6.3 MB
  • pdfDEFCON-13-Program.pdf 6.3 MB
  • pdfDEFCON-04-Program.pdf 5.7 MB
  • pdfDEFCON-11-Program.pdf 5.3 MB
【文档书籍】 DEF CON Conference Programs
收录时间:2021-03-26 文档个数:31 文档大小:871.0 MB 最近下载:2022-05-17 人气:423 磁力链接
  • pdfDEF CON 14 program.pdf 285.6 MB
  • pdfDEF CON 26 program.pdf 93.7 MB
  • pdfDEF CON 06 program.pdf 56.8 MB
  • pdfDEF CON 27 program.pdf 47.0 MB
  • pdfDEF CON 22 program.pdf 43.2 MB
  • pdfDEF CON 02 program.pdf 42.1 MB
  • pdfDEF CON 08 program.pdf 33.3 MB
  • pdfDEF CON 20 program.pdf 31.5 MB
  • pdfDEF CON 09 program.pdf 21.2 MB
  • pdfDEF CON 24 program.pdf 20.3 MB
  • pdfDEF CON China 1 program.pdf 20.3 MB
  • pdfDEF CON 19 program.pdf 19.9 MB
  • pdfDEF CON 28 Safe Mode program.pdf 19.2 MB
  • pdfDEF CON 25 program.pdf 17.1 MB
  • pdfDEF CON 23 program.pdf 16.8 MB
  • pdfDEF CON 21 program.pdf 15.3 MB
  • pdfDEF CON China beta program.pdf 12.5 MB
  • pdfDEF CON 18 program.pdf 11.1 MB
  • pdfDEF CON 28 Safe Mode closing ceremony slides.pdf 9.0 MB
  • pdfDEF CON 15 program.pdf 7.6 MB
【文档书籍】 DEF CON 6
收录时间:2021-04-26 文档个数:232 文档大小:572.3 MB 最近下载:2025-05-15 人气:113 磁力链接
  • pdfDEF CON 6 program.pdf 56.8 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Winn Schwartau - Hacker Jeopardy Friday Night.m4b 48.6 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation Panel Discussion - Securing Distributed Systems - Audio.m4b 44.7 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By the Cult of the Dead Cow (cDc) - The announcement of Back Orfice - Audio.m4b 41.9 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Winn Schwartau - Hacker Jeopardy Saturday Night - Audio.m4b 39.1 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Ian Goldberg and Austin Hill - Cryptanalysis of the GSM Identification Algorithm - Audio.m4b 27.2 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Jennifer Grannick - A Review of Several Major Computer Crime Cases from the Past Year or Two - Audio.m4b 23.3 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Peter Shipley - An Overview of a 2 year Effort in Massive Multi-modem Wardialing - Audio.m4b 22.6 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Mudge - TCPIP Drinking Game.m4b 22.1 MB
  • MPGDEF CON 6 pictures/DEF CON 6 - Lockheed - 072.MPG 21.5 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Bruce Schneier - Tradecraft on Public Networks - Audio.m4b 21.3 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Ian Goldberg and Austin Hill - Announcement of Zero Knowledge Systems - Audio.m4b 20.3 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Dan Veeneman - Future and Existing Satellite Systems - Audio.m4b 19.5 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Richard Thieme - The More Things Change The More They Dont - Audio.m4b 18.3 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Super Dave - Copyright vs. Freedom of Speech - Audio.m4b 18.0 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Winn Schwartau - Introducing the Time Based Security Model and Applying Military Strategies - Audio.m4b 17.6 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Paul Kocher - Designing and Production of the First Dedicated DES Cracker - Audio.m4b 15.8 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Mike Peros - Massive Illegal Wiretapping Exposed - Audio.m4b 14.3 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By John Q. Newman - The Lastest in how to REALLY Not Be Found - Audio.m4b 14.0 MB
  • m4bDEF CON 6 audio/DEF CON 6 Hacking Conference Presentation By Krusty - Social Engineering Contest - Audio.m4b 13.7 MB
共2页 上一页 1 2 下一页