DEF CON China 1

  • Seeders:2
  • Leechers:34
  • Completed:73
  • File size:2.79 GB
  • Date:2020-07-25

Files

  • DEF CON China 1 presentationsDEF CON China 1.0 - Demo LabsDEF CON China 1.0 - Demo-Lab-Joe-Grand-JTAGulator.pdf(489.61 KB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - Demo LabsDEF CON China 1.0 - Demo-Lab-Joe-Grand-JTAGulator.pdf.gz(475.28 KB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - Demo LabsDEF CON China 1.0 - Demo-Lab-Nishant-Sharma-VoIPShark--Open-Source-VoIP-Analysis-Platform.pdf(18.99 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - Demo LabsDEF CON China 1.0 - Demo-Lab-Nishant-Sharma-VoIPShark--Open-Source-VoIP-Analysis-Platform.pdf.gz(14.47 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - Demo LabsDEF CON China 1.0 - Nishant-Sharma-VoIPShark-Open-Source-VoIP-Analysis-Platform-DEMO.mp4(12.93 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Aden-Wee-Jing-Chung-You-are-not-hiding-from-me-Updated-.NET.pdf(1.81 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Alexandre-Borges-Modern Malware-De-obfuscation-emulation-and-rootkits.pdf(5.83 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Christopher-Wade-Tag-side-attacks-against-NFC-Demo-VideosDEF CON China 1.0 - Christopher-Wade-Tag-side-attacks-against-NFC-Demo-1.mp4(4.49 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Christopher-Wade-Tag-side-attacks-against-NFC-Demo-VideosDEF CON China 1.0 - Christopher-Wade-Tag-side-attacks-against-NFC-Demo-2.mp4(5.29 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Christopher-Wade-Tag-side-attacks-against-NFC-Demo-VideosDEF CON China 1.0 - Christopher-Wade-Tag-side-attacks-against-NFC-Demo-3.mp4(11.09 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Christopher-Wade-Tag-side-attacks-against-NFC-Demo-VideosDEF CON China 1.0 - Christopher-Wade-Tag-side-attacks-against-NFC-Demo-4.mp4(5.92 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Christopher-Wade-Tag-side-attacks-against-NFC.pdf(37.31 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Dou-Goodman-Transferability-of-Adversarial-Examples-to-Attack-Cloud-based-Image-Classifier-Service.pdf(1.52 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Gregory Pickett - 打破后端限制!坏设计惹的祸,不全是BUG的锅.pdf(4.58 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Gregory-Pickett-breaking-the-backend.pdf(10.62 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Joe-Grand-DEF-CON-China -1.0-Badge-Expanded.pdf(19.18 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Joe-Grand-DEF-CON-China -1.0-Badge.pdf(43.48 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Joey-Zhu-游戏安全的攻防艺术-The-art-of-game-security.pdf(5.79 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Marc-Newlin-&-Christopher-Grayson-IPv666-Address-of-the-Beast.pdf(8.42 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Nishant-Sharma-VoIPShark-Open-Source-VoIP-Analysis-Platform-DEMO.mp4(12.93 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Nishant-Sharma-VoIPShark-Open-Source-VoIP-Analysis-Platform.pdf(22.99 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Panel-Mission-Impossible-Updated.pdf(3.96 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Ramiro-Pareja-Gotta-glitch-'em-all.-10+-Years-of-War-Stories-Glitching-Embedded-Devices-v1.0-Optimized.pdf(11.38 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Sergey-Puzankov-Attacks-you-can't-combat-vulnerabilities-of-most-robust-mobile-operators.pdf(12.90 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - VOIPSHARK开源VOIP分析平台是与非.pdf(23.05 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Wang-Yang-Face-Swapping-Video-Detection-with-CNN-Without-Video.pdf(4.60 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Wang-Yang-Face-Swapping-Video-Detection-with-CNN.pdf(544.86 KB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Weiguang-Li-WARNING-Magnitude-10-Earthquake-Is-Coming-in-One-Minute 2.pdf(13.80 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Weiguang-Li-WARNING-Magnitude-10-Earthquake-Is-Coming-in-One-Minute.pdf(13.80 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Xiaohuihui-Security-analysis-on-IoT-equipment-through-building-a-base-station-system.pdf(17.42 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Zidong-Han-Bridge-Attack-Double-edged-Sword-in-MobileSec 2.pdf(2.82 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Zidong-Han-Bridge-Attack-Double-edged-Sword-in-MobileSec.pdf(2.82 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - Zoz-Hacking Driverless Vehicles.pdf(13.10 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - 不可能的任务:从用户空间窃取内核数据.pdf(3.99 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - 全面沦陷噪声攻击与IOT设备的10+年战争.pdf(35.94 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - 反击恶意软件源头做起不挖坑.pdf(4.42 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - 游戏安全的攻防艺术.pdf(11.36 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - PresentationsDEF CON China 1.0 - 警告地震将在10分钟内发生.pdf(13.82 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - WorkshopsDEF CON China 1.0 - Dino-Covostos-Hack-to-Basics.pdf(3.38 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - WorkshopsDEF CON China 1.0 - Joe-Grand-Badge-Hacking-Workshop.pdf(25.16 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - WorkshopsDEF CON China 1.0 - Joshua-Pereyda-Advanced-Custom-Network-Protocol-Fuzzing.pdf(417.81 MB)
  • DEF CON China 1 presentationsDEF CON China 1.0 - WorkshopsDEF CON China 1.0 - Philippe-Delteil-WiFi-Hacking.pdf(1.54 MB)
  • DEF CON China 1 program.pdf(19.35 MB)
  • DEF CON China 1 program.pdf.gz(18.61 MB)
  • DEF CON China 1 videosDEF CON China 1 - 10+ Years of War Stories Glitching Embedded and IoT Devices - Ramiro Pareja.mp4(183.92 MB)
  • DEF CON China 1 videosDEF CON China 1 - Attacks You Can't Combat- Vulnerabilities of Most Robust Mobile Operators - Sergey Puzankov.mp4(151.75 MB)
  • DEF CON China 1 videosDEF CON China 1 - Breaking the Back End - Gregory Pickett.mp4(131.93 MB)
  • DEF CON China 1 videosDEF CON China 1 - Bridge Attack Double-edged Sword in MobileSec - Zidong Han.mp4(36.76 MB)
  • DEF CON China 1 videosDEF CON China 1 - Chinese Mechanical Locks - An Insight into a Unique World of Locks - Lucas Zhao.mp4(151.82 MB)
  • DEF CON China 1 videosDEF CON China 1 - Creating the DEFCON China 1.0 badge - Joe Grand.mp4(68.79 MB)
  • DEF CON China 1 videosDEF CON China 1 - Diagnosing Root Cause of Software Vulnerabilities - Xinyu Xing Jimmy Su.mp4(145.19 MB)
  • DEF CON China 1 videosDEF CON China 1 - Face Swapping Video Detection with CNN - Wang Yang Junfeng Xiong Liu Yan Hao Xin Wei Tao.mp4(55.12 MB)
  • DEF CON China 1 videosDEF CON China 1 - Hacking Driverless Vehicles - ZOZ.mp4(140.25 MB)
  • DEF CON China 1 videosDEF CON China 1 - How to Perform Security Analysis on IOT Equipment Through Building a Base Station System - XiaoHuiHui .mp4(74.47 MB)
  • DEF CON China 1 videosDEF CON China 1 - IPV666 Address of the Beast - Christopher Grayson Marc Newlin.mp4(149.94 MB)
  • DEF CON China 1 videosDEF CON China 1 - Modern Malware De-obfuscation Emulation and Rootkits - Alexandre Borges.mp4(186.25 MB)
  • DEF CON China 1 videosDEF CON China 1 - Tag-side attacks against NFC - Christopher Wade.mp4(60.64 MB)
  • DEF CON China 1 videosDEF CON China 1 - The Art of Game Security - Joey Zhu.mp4(71.06 MB)
  • DEF CON China 1 videosDEF CON China 1 - Transferability of Adversarial Examples to Attack Cloud-based Image Classifier - Liu Yan.mp4(88.19 MB)
  • DEF CON China 1 videosDEF CON China 1 - VoIPShark Open Source VoIP Analysis Platform - N Sharma Jay Mathai Marc Newlin.mp4(131.21 MB)
  • DEF CON China 1 videosDEF CON China 1 - Warning Magnitude 10 Earthquake Is Coming in One Minute - Weiguang Li.mp4(34.70 MB)
  • DEF CON China 1 videosDEF CON China 1 - You are not hiding from me NET - Aden Wee Jing Chung.mp4(62.39 MB)
  • DEF CON China 1 videoschina hardware hacking.mp4(2.22 MB)
  • DEF CON China 1 videosdcc village total.mp4(2.59 MB)
  • DEF CON China 1 videosdunk tank.mp4(1.15 MB)

Favorites