磁力管家

磁力管家
为您索检到19条磁力链接,耗时0毫秒。 rss

分享给好友

【文档书籍】 Presentations
收录时间:2017-02-08 文档个数:38 文档大小:636.7 MB 最近下载:2025-05-12 人气:2498 磁力链接
  • pptБез звука/Беги, жучок.ppt 1.6 MB
  • pptБез звука/домашние животные.ppt 303.1 kB
  • pptБез звука/Курочка ряба.ppt 937.0 kB
  • pptБез звука/Лисичка-сестричка и серый волк.ppt 3.4 MB
  • pptБез звука/Маша и Медведь.ppt 3.5 MB
  • pptБез звука/Машина неделя.ppt 3.5 MB
  • pptБез звука/Млекопитающие.ppt 268.8 kB
  • pptБез звука/Мой мишка.ppt 1.4 MB
  • pptБез звука/Насекомые.ppt 77.8 kB
  • pptБез звука/Новые приключения Пифа.ppt 4.9 MB
  • pptБез звука/петух и краски.ppt 606.2 kB
  • pptБез звука/Птицы.ppt 296.4 kB
  • pptБез звука/Три котенка.ppt 1.2 MB
  • pptБез звука/Упрямый козленок.ppt 3.1 MB
  • pptБез звука/цыпленок и утенок.ppt 747.5 kB
  • pptОзвученные/Айболит.ppt 46.7 MB
  • pptОзвученные/Два жадных медвежонка.ppt 24.5 MB
  • pptОзвученные/Жил на свете слоненок.ppt 12.6 MB
  • pptОзвученные/Знаменитый утенок Тим.ppt 27.3 MB
  • pptОзвученные/Золушка.ppt 46.1 MB
【文档书籍】 1,000 Food Art and Styling Ideas. Mouthwatering Food Presentations from Chefs, Photographers, and Bloggers
收录时间:2021-03-10 文档个数:1 文档大小:118.4 MB 最近下载:2025-05-15 人气:2203 磁力链接
  • pdf1_2C000_Food_Art_and_Styling_Ideas.pdf 118.4 MB
【文档书籍】 Powerpoint presentations
收录时间:2017-02-11 文档个数:37 文档大小:92.1 MB 最近下载:2025-05-14 人气:2007 磁力链接
  • pptSun.ppt 14.1 MB
  • pptIntermolecular Forces.ppt 9.5 MB
  • pptProperties of Solutions.ppt 9.4 MB
  • pptC5 Electricity Magnetism.ppt 4.8 MB
  • ppt13_Plant_Kingdom_Part_One.ppt 4.6 MB
  • pptDNA Notes.ppt 3.8 MB
  • pptCoils and Inductance.ppt 3.6 MB
  • pptVirus.ppt 3.2 MB
  • ppteclipse.ppt 3.0 MB
  • pptancient_civ.ppt 2.9 MB
  • pptEarthquakes(1).ppt 2.9 MB
  • pptIntroductiontoConstellation.ppt 2.9 MB
  • pptGases.ppt 2.5 MB
  • ppt011Light.ppt 2.5 MB
  • pptArchemedis.ppt 2.2 MB
  • pptBonding 2005.ppt 2.2 MB
  • pptEclipses.ppt 2.2 MB
  • pptEarthquakes.ppt 1.9 MB
  • pptBonds and Energy.ppt 1.8 MB
  • pptMicroscope.ppt 1.8 MB
【文档书籍】 DEF CON 25 presentations
收录时间:2017-08-22 文档个数:202 文档大小:1.1 GB 最近下载:2025-05-15 人气:1448 磁力链接
  • pdfDimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf 74.5 MB
  • pdf5A1F/DEFCON-25-5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects.pdf 11.2 MB
  • pdfAlvaro Munoz and Oleksandr Mirosh - UPDATED/DEFCON-25-Alvaro-Munoz-and-Oleksandr-Mirosh-JSON-Attacks-UPDATED.pdf 19.7 MB
  • pdfAlvaro Munoz and Oleksandr Mirosh - UPDATED/DEFCON-25-Alvaro-Munoz-JSON-attacks-WP-UPDATED.pdf 680.9 kB
  • pdfCheng Lei/DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus-WP.pdf 1.3 MB
  • pdfCheng Lei/DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus.pdf 1.7 MB
  • pdfCooper Quintin and Kashmir Hill - UPDATED/DEFCON-25-Cooper-Quintin-and-Kashmir-Hill-The-Internet-Already-Knows-Im-Pregnant-UPDATED.pdf 4.1 MB
  • pdfCooper Quintin and Kashmir Hill - UPDATED/DEFCON-25-Cooper-Quintin-The-Pregnancy-Panopticon-WP-UPDATED.pdf 646.4 kB
  • pdfDEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf 5.9 MB
  • pdfDEFCON-25-0ctane-Untrustworthy-Hardware.pdf 2.5 MB
  • pdfDEFCON-25-Alvaro-Munoz-JSON-attacks.pdf 1.9 MB
  • pdfDEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf 3.1 MB
  • pdfDEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation-UPDATED.pdf 7.3 MB
  • pdfDEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf 2.7 MB
  • pdfDEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf 3.3 MB
  • pdfDEFCON-25-Brown-and-Latimer-Game-of-Drones-Drone-Defense-Market-UPDATED.pdf 31.4 MB
  • pdfDEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf 4.5 MB
  • pdfDEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre-UPDATED.pdf 44.7 MB
  • pdfDEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf 5.3 MB
  • pdfDEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes-UPDATED.pdf 7.0 MB
【文档书籍】 1,000 Food Art and Styling Ideas - Mouthwatering Food Presentations from Chefs, Photographers and Bloggers from Around the Globe (2013).pdf
收录时间:2017-02-13 文档个数:1 文档大小:132.1 MB 最近下载:2025-05-12 人气:1421 磁力链接
  • pdf1,000 Food Art and Styling Ideas - Mouthwatering Food Presentations from Chefs, Photographers and Bloggers from Around the Globe (2013).pdf 132.1 MB
【文档书籍】 DEF CON 25 presentations
收录时间:2017-08-10 文档个数:198 文档大小:1.1 GB 最近下载:2025-05-15 人气:1210 磁力链接
  • pdfDimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf 74.5 MB
  • pdfDEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf 2.0 MB
  • pdfDEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf 1.7 MB
  • pdfDEFCON-25-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation-UPDATED.pdf 5.8 MB
  • pdfDEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf 2.3 MB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject.pdf 847.8 kB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject-WP.pdf 1.5 MB
  • pdfDEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf 6.4 MB
  • pdfDEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware-UPDATED.pdf 3.5 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf 2.1 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf 1.2 MB
  • pdfDEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf 3.1 MB
  • pdfDEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf 2.7 MB
  • pdfDEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security-UPDATED.pdf 1.4 MB
  • pdfDEFCON-25-Professor-Plum-Digital-Vengeance-Exploiting-Notorious-Toolkits-UPDATED.pdf 7.2 MB
  • pdfMatt Knight and Marc Newlin - UPDATED/DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-UPDATED.pdf 26.8 MB
  • pdfMatt Knight and Marc Newlin - UPDATED/DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP-UPDATED.pdf 128.0 kB
  • pdfDEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf 256.0 kB
  • pdfDEFCON-25-Matt-Joyce-Amateur-Digital-Archeology-UPDATED.pdf 60.0 MB
  • pdfDEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist-UPDATED.pdf 5.8 MB
【文档书籍】 DEF CON 24 presentations
收录时间:2017-03-09 文档个数:227 文档大小:991.7 MB 最近下载:2024-08-13 人气:1107 磁力链接
  • pdfDEFCON-24-Ang-Cui-and-Jatin-Kataria-A-Monitor-Darkly-UPDATED.pdf 142.7 MB
  • pdfDEFCON-24-Demay-CANSPY-a-Platorm-For-Auditing-CAN-Devices-WP-UPDATED.pdf 838.2 kB
  • pdfDEFCON-24-Tom-Kopchak-Sentient-Storage.pdf 1.6 MB
  • pdfDEFCON-24-Aaron-Luo-Drones-Hijacking-Multi-Dimensional-Attack-Vectors-And-Countermeasures-UPDATED.pdf 4.8 MB
  • pdfDEFCON-24-Guevara-Noubir-Amirali-Sanatinia-Honey-Onions-Exposing-Snooping-Tor-Hsdir-Relays.pdf 1.7 MB
  • pdfDEFCON-24-Chris-Rock-How-to-overthrow-a-Government-Kuwait-Coup-WP.pdf 236.9 kB
  • pdfDEFCON-24-Demay-CANSPY-a-Platorm-For-Auditing-CAN-Devices-UPDATED.pdf 1.8 MB
  • pdfDEFCON-24-Shane-Steiger-Maelstrom-Are-You-Playing-With-A-Full-Deck-UPDATED.pdf 8.7 MB
  • pdfDEFCON-24-Maldonado-Mcguffin-Sticky-Keys-To-The-Kingdom.pdf 850.9 kB
  • pdfDEFCON-24-Wesley-McGrew-Secure-Penetration-Testing-Operations-WP.pdf 128.6 kB
  • pdfDEFCON-24-Adam-Donenfeld-Stumping-The-Mobile-Chipset.pdf 2.8 MB
  • pdfDEFCON-24-Jmaxxz-Backdooring-the-Frontdoor-UPDATED.pdf 1.7 MB
  • pdfDEFCON-24-Mike-Rich-Use-Their-Machines-Against-Them-WP.pdf 1.3 MB
  • pdfDEFCON-24-Thomas-Wilhelm-Hacking-Network-Protocols-Using-Kali.pdf 599.1 kB
  • pdfDEFCON-24-Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection-Writeup.pdf 3.2 MB
  • pdfDEFCON-24-Regilero-Hiding-Wookiees-In-Http.pdf 420.0 kB
  • DEFCON-24-Seymour-Tully-Extras/auto-phish/LICENSEDEFCON-24-Seymour-Tully-Extras/auto-phish/LICENSE 1.6 kB
  • pyDEFCON-24-Seymour-Tully-Extras/auto-phish/credentials.py 283 Bytes
  • pyDEFCON-24-Seymour-Tully-Extras/auto-phish/cluster.py 9.4 kB
  • mdDEFCON-24-Seymour-Tully-Extras/auto-phish/Readme.md 1.7 kB
【文档书籍】 DEF CON 22 presentations
收录时间:2017-02-10 文档个数:180 文档大小:1.2 GB 最近下载:2025-05-15 人气:754 磁力链接
  • pdfGene Bransfeild - Updated/DEFCON-22-Gene-Bransfield-Weaponizing-your-Pets-UPDATED.pdf 65.2 MB
  • pdfCeline and Elie Bursztein - Updated/DEFCON-22-Celine-and-Elie-Bursztein-I-am-a-legend-UPDATED.pdf 51.7 MB
  • pdfWill Schroeder/DEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf 51.2 MB
  • pdfDominic White and Ian de Villiers - Updated/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-onscreen-Updated.pdf 51.0 MB
  • pdfDhia Mahjoub, Andree Toonk, and Thibault Reuille - Updated/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf 46.9 MB
  • pdfLadar Levison and Stephen Watt - Updated/DEFCON-22-Levison-Watt-Dark-Mail-UPDATED.pdf 39.3 MB
  • pdfJoe Fitzpatrick and Miles Crabill - Updated/DEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe-UPDATED.pdf 38.3 MB
  • pdfHeres, Etemadieh, Baker and Nielsen - Updated/DEFCON-22-Heres-Etemadieh-Baker-Nielsen-Hack-All-The-Things-UPDATED.pdf 37.4 MB
  • zipJesse Michael and Mickey Shkatov - Updated/Jesse Michael and Mickey Shkatov - Extras.zip 36.3 MB
  • pdfFatih Ozavci - Updated/DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones-UPDATED.pdf 35.4 MB
  • pdfColby Moore and Patrick Wardle - Updated/DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam-Updated.pdf 31.6 MB
  • pdfDominic White and Ian de Villiers - Updated/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdf 31.6 MB
  • pdfKenneth White and Matthew Green - Updated/DEFCON-22-Kenneth-White-and-Matthew-Green-The-Open-Crypto-Audit-Project-Updated.pdf 31.5 MB
  • pdfAndrew Hunt - Updated/DEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise-UPDATED.pdf 27.6 MB
  • zipBrian Gorenc and Matt Molinyawe -Updated/Brian Gorenc and Matt Molinyawe - Extras.zip 27.4 MB
  • pdfGlenn Wilkinson - Updated/DEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance-UPDATED.pdf 27.2 MB
  • pdfRmellendick and DaKahuna - Updated/DEFCON-22-Rmellendick-Dakahuna-RF-Penetration-Testing-Your-Air-Stinks-UPDATED.pdf 26.3 MB
  • pdfPhil Polstra - Updated/DEFCON-22-Phil-Polstra-Am-I-Being-Spied-On-Updated.pdf 23.3 MB
  • pdfBrian Gorenc and Matt Molinyawe -Updated/DEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly-UPDATED.pdf 20.8 MB
  • pdfZoz - Updated/DEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdf 20.1 MB
【文档书籍】 DEF CON 25 presentations
收录时间:2017-08-01 文档个数:130 文档大小:501.3 MB 最近下载:2024-10-31 人气:698 磁力链接
  • pdfDimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf 74.5 MB
  • pdfDEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf 2.0 MB
  • pdfDEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf 1.7 MB
  • pdfDEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf 2.3 MB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject.pdf 847.8 kB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject-WP.pdf 1.5 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf 2.1 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf 1.2 MB
  • pdfDEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf 3.1 MB
  • pdfDEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf 2.7 MB
  • pdfDEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf 256.0 kB
  • pdfDEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf 5.8 MB
  • pdfDEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf 2.3 MB
  • pdfDEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf 5.3 MB
  • pdfDEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf 4.5 MB
  • pdfDEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf 1.9 MB
  • pdfDEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf 2.0 MB
  • pdfMark Newlin Logan Lamb and Christopher Grayson/DEFCON-25-Newlin-Lamb-Grayson-CableTap-Wirelessly-Tapping-Your-Home-Network.pdf 3.9 MB
  • pdfDEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf 5.1 MB
  • pdfMatt Suiche/DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-WP.pdf 317.7 kB
【文档书籍】 DEF CON 25 presentations
收录时间:2017-07-28 文档个数:128 文档大小:491.6 MB 最近下载:2025-03-02 人气:572 磁力链接
  • pdfDimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf 74.5 MB
  • pdfDEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf 1.7 MB
  • pdfDEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf 2.3 MB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject.pdf 847.8 kB
  • pdfDor Azouri/DEFCON-25-Dor-Azouri-BITSInject-WP.pdf 1.5 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf 2.1 MB
  • pdfMorten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf 1.2 MB
  • pdfDEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf 3.1 MB
  • pdfDEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf 2.7 MB
  • pdfDEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf 256.0 kB
  • pdfDEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf 5.8 MB
  • pdfDEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf 5.3 MB
  • pdfDEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf 4.5 MB
  • pdfDEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf 1.9 MB
  • pdfDEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf 2.0 MB
  • pdfMark Newlin Logan Lamb and Christopher Grayson/DEFCON-25-Newlin-Lamb-Grayson-CableTap-Wirelessly-Tapping-Your-Home-Network.pdf 3.9 MB
  • pdfDEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf 5.1 MB
  • pdfMatt Suiche/DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-WP.pdf 317.7 kB
  • pdfMatt Suiche/DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts.pdf 6.4 MB
  • pdfDEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf 7.0 MB
【文档书籍】 DEF CON 24 presentations
收录时间:2017-05-09 文档个数:225 文档大小:985.9 MB 最近下载:2025-05-15 人气:481 磁力链接
  • pdfDEFCON-24-Ang-Cui-and-Jatin-Kataria-A-Monitor-Darkly-UPDATED.pdf 142.7 MB
  • pdfDEFCON-24-Mike-Rich-Use-Their-Machines-Against-Them-WP.pdf 1.3 MB
  • pdfDEFCON-24-Patrick-Wardle-99-Problems-Little-Snitch.pdf 14.9 MB
  • pdfDEFCON-24-Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle.pdf 1.3 MB
  • pdfDEFCON-24-Hecker-Hacking-Hotel-Keys-and-PoS-Systems-UPDATED.pdf 2.4 MB
  • pdfDEFCON-24-Fasel-Jacobs-I-fight-for-the-users-UPDATED.pdf 127.8 MB
  • pdfDEFCON-24-Panel-How-To-Make-A-DEFCON-Black-Badge.pdf 2.9 MB
  • pdfDEFCON-24-Adam-Donenfeld-Stumping-The-Mobile-Chipset-UPDATED.pdf 4.4 MB
  • pdfDEFCON-24-Radia-Perlman-Resilience-Despite-Malicious-Pariticpants.pdf 763.2 kB
  • pdfDEFCON-24-Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle-UPDATED.pdf 4.6 MB
  • pdfDEFCON-24-Anto-Joseph-Fuzzing-Android-Devices.pdf 31.7 MB
  • pdfDEFCON-24-Ladar-Levison-Compelled-Decryption.pdf 6.1 MB
  • pdfDEFCON-24-Tamas-Szakaly-Help-I-got-ANTS.pdf 6.0 MB
  • pdfDEFCON-24-Tim-Estell-Katea-Murray-NPRE-Eavesdropping-on-the-Machines.pdf 1.3 MB
  • pdfDEFCON-24-Benjamin-Holland-Developing-Managed-Code-Rootkits-For-Java-Runtime.pdf 722.0 kB
  • pdfDEFCON-24-Forgety-Kreilein-Ng9-1-1-The-Next-Gene-Of-Emergency-Ph0Nage.pdf 3.4 MB
  • pyDEFCON-24-Amro-Abdelgawad-Extras/sample3_isDebugged2.py 15.7 kB
  • pyDEFCON-24-Amro-Abdelgawad-Extras/sample1_CPUID.py 15.7 kB
  • pyDEFCON-24-Amro-Abdelgawad-Extras/rmengine_client.py 1.9 kB
  • pyDEFCON-24-Amro-Abdelgawad-Extras/rmengine_CPUID.py 16.2 kB
【文档书籍】 DEF CON 21 presentations
收录时间:2017-03-15 文档个数:426 文档大小:896.6 MB 最近下载:2025-05-12 人气:467 磁力链接
  • pdfAng Cui and Micheal Costello-Updated/DEFCON-21-Cui-Costello-Stepping-P3wns-Updated.pdf 102.7 MB
  • pdfBalint Seeber/DEFCON-21-Balint-Seeber-All-Your-RFz-Are-Belong-to-Me.pdf 71.7 MB
  • pdfEtemadieh and Panel/DEFCON-21-Etemadieh-Panel-Google-TV-Secure-Boot-Exploit-GTVHacker.pdf 32.1 MB
  • pdfBrendan O'Connor-Updated/DEFCON-21-OConnor-Stalking-a-City-for-Fun-and-Frivolity-Updated.pdf 31.4 MB
  • pdfBrendan O'Connor-Updated/DEFCON-21-OConnor-Stalking-a-City-for-Fun-and-Frivolity.pdf 27.9 MB
  • pdfsoen-Updated_/DEFCON-21-soen-Evolving-Exploits-Through-Genetic-Algorithms-Updated.pdf 25.2 MB
  • mp4Pukingmonkey-Updated/Extras/DEFCON-21-05ezpassdetectortimessquaretomsgin90seconds-(1).mp4 22.0 MB
  • mp4Pukingmonkey-Updated/Extras/DEFCON-21-05ezpassdetectortimessquaretomsgin90seconds.mp4 22.0 MB
  • pdfChris John Riley-Updated/DEFCON-21-Riley-Defense-by-Numbers-Updated.pdf 21.9 MB
  • pdfsoen-Updated_/DEFCON-21-soen-Evolving-Exploits-Through-Genetic-Algorithms.pdf 21.5 MB
  • pdfChris John Riley-Updated/DEFCON-21-Riley-Defense-by-Numbers.pdf 21.3 MB
  • pdfTom Keenan/DEFCON-21-Tom-Keenan-Torturing-Open-Government-Systems-for-Fun.pdf 18.9 MB
  • mp4Pukingmonkey-Updated/Updated Extras/slide103-times-square-to-msg.mp4 17.8 MB
  • pdfPukingmonkey-Updated/DEFCON-21-Pukingmonkey-The-Road-Less-Surreptitiously-Traveled.pdf 16.2 MB
  • pdfm0nk-Updated/DEFCON-21-m0nk-BoutiqueKit-Updated.pdf 16.0 MB
  • pdfPhorkus and Evilrob/DEFCON-21-Phorkus-Evilrob-Hacking-Embedded-Devices-Bad-things-to-Good-hardware.pdf 15.8 MB
  • pdfPukingmonkey-Updated/DEFCON-21-Pukingmonkey-The-Road-Less-Surreptitiously-Traveled-Updated.pdf 14.4 MB
  • pdfJason Scott and Rachel Lovinger-Updated/DEFCON-21-Scott and Lovinger-Making-the-DEFCON-doc.pdf 13.3 MB
  • pdfJohn Ortiz/DEFCON-21-Ortiz-Fast-Forensics-Using-Simple-Statistics-and-Cool-Tools.pdf 11.6 MB
  • pdfComedy-Jam/DEFCON-21-Panel-Comedy-Jam-Fail-Panel-Updated.pdf 11.1 MB
【文档书籍】 DEF CON 26 presentations
收录时间:2018-08-15 文档个数:1036 文档大小:2.9 GB 最近下载:2025-05-15 人气:450 磁力链接
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-1-mpclient.mp4 367.1 kB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-2-outputdebugstringa.mp4 4.8 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-3-file-system.mp4 4.0 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-4-proclist.mp4 2.7 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-5-apicall.mp4 4.1 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-6-fuzz.mp4 7.9 MB
  • pdfAlexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender.pdf 41.6 MB
  • mp4Alfonso Garcia and Alejo Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_1.mp4 1.6 MB
  • mp4Alfonso Garcia and Alejo Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_2.mp4 1.9 MB
  • mp4Alfonso Garcia and Alejo Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_3.mp4 1.1 MB
  • pdfAlfonso Garcia and Alejo Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story-Updated.pdf 4.8 MB
  • mp4Andrea Marcelli/DEFCON-26-Andrea-Marcelli-Demo-Video.mp4 2.4 MB
  • pdfAndrea Marcelli/DEFCON-26-Andrea-Marcelli-Looking-for-the-perfect-signature-automatic-YARA-rules.pdf 4.3 MB
  • pdfBai Zheng and Chai Wang/DEFCON-26-Bai-Zheng-Chai-Wang-You-May-Have-Paid-more-than-You-Imagine.pdf 9.7 MB
  • pdfChristopher Domas/DEFCON-26-Christopher-Domas-GOD-MODE- UNLOCKED-hardware-backdoors-in-x86-CPUs.pdf 8.0 MB
  • pdfChristopher Domas/DEFCON-26-Christopher-Domas-The-Ring-0-Facade.pdf 3.9 MB
  • pdfDEFCON-26-Alex-Levinson-Overview-of-Genesis-Scripting-Engine.pdf 9.2 MB
  • pdfDEFCON-26-Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses-Updated.pdf 1.6 MB
  • pdfDEFCON-26-Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses.pdf 5.4 MB
  • pdfDEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story.pdf 2.5 MB
【文档书籍】 DEF CON 26 presentations
收录时间:2018-09-21 文档个数:696 文档大小:3.8 GB 最近下载:2025-05-15 人气:318 磁力链接
  • pdf0x200b/DEFCON-26-0x200b-Detecting-Blue-Team-Research-Through-Targeted-Ads-Updated.pdf 1.3 MB
  • pdfAlex Levinson/DEFCON-26-Alex-Levinson-Overview-of-Genesis-Scripting-Engine.pdf 9.2 MB
  • pdfAlexandre Borges - Updated/DEFCON-26-Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses-Updated.pdf 5.9 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-1-mpclient.mp4 367.1 kB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-2-outputdebugstringa.mp4 4.8 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-3-file-system.mp4 4.0 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-4-proclist.mp4 2.7 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-5-apicall.mp4 4.1 MB
  • mp4Alexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-6-fuzz.mp4 7.9 MB
  • pdfAlexei Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Updated.pdf 42.0 MB
  • mp4Alfonso Garcia and Alejo Murillo - Updated/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_1.mp4 1.6 MB
  • mp4Alfonso Garcia and Alejo Murillo - Updated/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_2.mp4 1.9 MB
  • mp4Alfonso Garcia and Alejo Murillo - Updated/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_3.mp4 1.1 MB
  • pdfAlfonso Garcia and Alejo Murillo - Updated/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story-Updated.pdf 6.2 MB
  • pdfAmanda Rousseau and Rich Seymour/DEFCON-26-Rousseau-and-Seymour-Finding-Xori-Malware-Analysis-Triage-w-Auto-Disassembly.pdf 1.6 MB
  • pdfAmir Etemadieh - ZenoFex/DEFCON-26-Amir-Etemadieh-Zenofex-Dissecting-Teddy-Ruxpin-Reverse-Engineering-the-Smart Bear.pdf 9.7 MB
  • mp4Andrea Marcelli/DEFCON-26-Andrea-Marcelli-Demo-Video.mp4 2.4 MB
  • pdfAndrea Marcelli/DEFCON-26-Andrea-Marcelli-Looking-for-the-perfect-signature-automatic-YARA-rules.pdf 4.3 MB
  • pdfBai Zheng and Chai Wang/DEFCON-26-Bai-Zheng-Chai-Wang-You-May-Have-Paid-more-than-You-Imagine.pdf 9.7 MB
  • pdfChristopher Domas/DEFCON-26-Christopher-Domas-GOD-MODE-UNLOCKED-hardware-backdoors-in-x86-CPUs.pdf 13.6 MB
【文档书籍】 Defcon 21 - 2013 Speaker Presentations DVD
收录时间:2021-03-25 文档个数:292 文档大小:485.2 MB 最近下载:2024-12-24 人气:227 磁力链接
  • pdfSpeaker Materials/Balint Seeber/DEFCON-21-Balint-Seeber-All-Your-RFz-Are-Belong-to-Me.pdf 71.7 MB
  • pdfSpeaker Materials/Etemadieh and Panel/DEFCON-21-Etemadieh-Panel-Google-TV-Secure-Boot-Exploit-GTVHacker.pdf 32.1 MB
  • pdfSpeaker Materials/Brendan O'Connor/DEFCON-21-OConnor-Stalking-a-City-for-Fun-and-Frivolity.pdf 27.9 MB
  • mp4Speaker Materials/Pukingmonkey/Extras/DEFCON-21-05ezpassdetectortimessquaretomsgin90seconds-(1).mp4 22.0 MB
  • mp4Speaker Materials/Pukingmonkey/Extras/DEFCON-21-05ezpassdetectortimessquaretomsgin90seconds.mp4 22.0 MB
  • pdfSpeaker Materials/soen/DEFCON-21-soen-Evolving-Exploits-Through-Genetic-Algorithms.pdf 21.5 MB
  • pdfSpeaker Materials/Chris John Riley/DEFCON-21-Riley-Defense-by-Numbers.pdf 21.3 MB
  • pdfSpeaker Materials/Tom Keenan/DEFCON-21-Tom-Keenan-Torturing-Open-Government-Systems-for-Fun.pdf 18.9 MB
  • pdfSpeaker Materials/Pukingmonkey/DEFCON-21-Pukingmonkey-The-Road-Less-Surreptitiously-Traveled.pdf 16.2 MB
  • pdfSpeaker Materials/Phorkus and Evilrob/DEFCON-21-Phorkus-Evilrob-Hacking-Embedded-Devices-Bad-things-to-Good-hardware.pdf 15.8 MB
  • pdfSpeaker Materials/John Ortiz/DEFCON-21-Ortiz-Fast-Forensics-Using-Simple-Statistics-and-Cool-Tools.pdf 11.6 MB
  • pdfSpeaker Materials/Gregory Pickett/DEFCON-21-Pickett-Lets-Screw-With-NMAP.pdf 6.6 MB
  • pdfSpeaker Materials/Joe Grand/DEFCON-21-Grand-JTAGulator.pdf 6.5 MB
  • pdfSpeaker Materials/Hunter Scott/DEFCON-21-Scott-Security-in-Cognitive-Radio-Networks.pdf 6.0 MB
  • txtSpeaker Materials/Flipper/Extras/OpenGlider IGES Files/9387000008.IGS.txt 5.8 MB
  • pdfSpeaker Materials/Lawrence and Panel/DEFCON-21-Lawrence-Johnson-Karpman-Key-Decoding-and-Duplication-Schlage.pdf 5.8 MB
  • base64Speaker Materials/Joseph Paul Cohen/Extras/DEFCON-21-blucat.base64 5.4 MB
  • txtSpeaker Materials/Flipper/Extras/OpenGlider V0.1.x_t.txt 5.2 MB
  • mp4Speaker Materials/Pukingmonkey/Extras/02_ezpass_detector_of_open_road_tolling.mp4 5.0 MB
  • pdfSpeaker Materials/Marc Weber Tobias and Tobias Bluzmanis/DEFCON-21-Tobias-Bluzmanis-Insecurity-A-Failure-of-Imagination.pdf 4.9 MB
【文档书籍】 Power point advanced presentations
收录时间:2017-03-01 文档个数:2 文档大小:89.3 MB 最近下载:2022-03-17 人气:171 磁力链接
  • chmPowerPoint Advanced Presentation Techniques.chm 89.3 MB
  • txtTorrent downloaded from Demonoid.com.txt 47 Bytes
【文档书籍】 1,000 Food Art and Styling Ideas = Mouthwatering Food Presentations from Chefs, Photographers, and Bloggers from Around the Globe @ Ari Bendersky.pdf
收录时间:2017-02-20 文档个数:1 文档大小:118.4 MB 最近下载:2024-08-09 人气:151 磁力链接
  • pdf1,000 Food Art and Styling Ideas = Mouthwatering Food Presentations from Chefs, Photographers, and Bloggers from Around the Globe @ Ari Bendersky.pdf 118.4 MB
【文档书籍】 Presentations
收录时间:2017-04-11 文档个数:38 文档大小:636.7 MB 最近下载:2025-03-13 人气:19 磁力链接
  • pptБез звука/Беги, жучок.ppt 1.6 MB
  • pptБез звука/Курочка ряба.ppt 937.0 kB
  • pptБез звука/Лисичка-сестричка и серый волк.ppt 3.4 MB
  • pptБез звука/Маша и Медведь.ppt 3.5 MB
  • pptБез звука/Машина неделя.ppt 3.5 MB
  • pptБез звука/Млекопитающие.ppt 268.8 kB
  • pptБез звука/Мой мишка.ppt 1.4 MB
  • pptБез звука/Насекомые.ppt 77.8 kB
  • pptБез звука/Новые приключения Пифа.ppt 4.9 MB
  • pptБез звука/Птицы.ppt 296.4 kB
  • pptБез звука/Три котенка.ppt 1.2 MB
  • pptБез звука/Упрямый козленок.ppt 3.1 MB
  • pptБез звука/домашние животные.ppt 303.1 kB
  • pptБез звука/петух и краски.ppt 606.2 kB
  • pptБез звука/цыпленок и утенок.ppt 747.5 kB
  • pptОзвученные/Айболит.ppt 46.7 MB
  • pptОзвученные/Два жадных медвежонка.ppt 24.5 MB
  • pptОзвученные/Жил на свете слоненок.ppt 12.6 MB
  • pptОзвученные/Знаменитый утенок Тим.ppt 27.3 MB
  • pptОзвученные/Золушка.ppt 46.1 MB
【文档书籍】 digibarn-powerpoint-presentations-2003-16
收录时间:2024-09-08 文档个数:70 文档大小:303.7 MB 最近下载:2025-01-08 人气:12 磁力链接
  • pdf16-09-06-VCF-XII-DigiBarn.pdf 57.2 MB
  • pptx16-09-06-VCF-XII-DigiBarn.pptx 51.4 MB
  • zip16-09-06-VCF-XII-DigiBarn_jp2.zip 29.7 MB
  • zipbruce-von-neumann-bottleneck-COMPRESSED_jp2.zip 25.8 MB
  • pptbruce-von-neumann-bottleneck-COMPRESSED.ppt 21.6 MB
  • zipbruce-damer-larry-lessig-mar-2003_jp2.zip 21.0 MB
  • zipbruce-digital-history-humlab-COMPRESSED_jp2.zip 19.0 MB
  • pdfbruce-von-neumann-bottleneck-COMPRESSED.pdf 13.9 MB
  • pdfbruce-digital-history-humlab-COMPRESSED.pdf 8.5 MB
  • pptbruce-digital-history-humlab-COMPRESSED.ppt 8.5 MB
  • zipasilomar-linc-2008_jp2.zip 6.5 MB
  • pdfbruce-damer-on-GUIs-COMPRESSED.pdf 4.6 MB
  • pptbruce-damer-on-GUIs-COMPRESSED.ppt 4.3 MB
  • html16-09-06-VCF-XII-DigiBarn_hocr.html 4.2 MB
  • pdfasilomar-linc-2008.pdf 4.1 MB
  • pptasilomar-linc-2008.ppt 3.8 MB
  • pptbruce-damer-larry-lessig-mar-2003.ppt 3.8 MB
  • pdfbruce-damer-larry-lessig-mar-2003.pdf 3.6 MB
  • zipbruce-damer-on-GUIs-COMPRESSED_jp2.zip 2.4 MB
  • xml16-09-06-VCF-XII-DigiBarn_djvu.xml 2.1 MB
共1页 上一页 1 下一页