MagnetSeek LogoMagnetSeek
Home/Categories/Torrent Details

DEF CON 25 presentations

1.04 GB
Total Size
100
Files
April
Created
0
Seeders
1
Leechers

Basic Info

Hash: 724461c1f5de80fe1b7bc8fbfacfd213e2d05c7f
File Status: Single-file
Type: Public
Back to Search

File List (100 Files)

Dimitry Snezhkov/DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf

#1
PDF
71.01 MB

DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf

#2
PDF
1.87 MB

DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf

#3
PDF
1.64 MB

DEFCON-25-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation-UPDATED.pdf

#4
PDF
5.53 MB

DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf

#5
PDF
2.16 MB

Dor Azouri/DEFCON-25-Dor-Azouri-BITSInject.pdf

#6
PDF
827.94 KB

Dor Azouri/DEFCON-25-Dor-Azouri-BITSInject-WP.pdf

#7
PDF
1.46 MB

DEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf

#8
PDF
6.14 MB

DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware-UPDATED.pdf

#9
PDF
3.33 MB

Morten Schenk/DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf

#10
PDF
1.97 MB