DEF CON 22 presentations
- Gene Bransfeild - UpdatedDEFCON-22-Gene-Bransfield-Weaponizing-your-Pets-UPDATED.pdf62.22 MB
- Celine and Elie Bursztein - UpdatedDEFCON-22-Celine-and-Elie-Bursztein-I-am-a-legend-UPDATED.pdf49.27 MB
- Will SchroederDEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf48.78 MB
- Dominic White and Ian de Villiers - UpdatedDEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-onscreen-Updated.pdf48.64 MB
- Dhia Mahjoub, Andree Toonk, and Thibault Reuille - UpdatedDEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf44.74 MB
- Ladar Levison and Stephen Watt - UpdatedDEFCON-22-Levison-Watt-Dark-Mail-UPDATED.pdf37.5 MB
- Joe Fitzpatrick and Miles Crabill - UpdatedDEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe-UPDATED.pdf36.55 MB
- Heres, Etemadieh, Baker and Nielsen - UpdatedDEFCON-22-Heres-Etemadieh-Baker-Nielsen-Hack-All-The-Things-UPDATED.pdf35.64 MB
- Jesse Michael and Mickey Shkatov - UpdatedJesse Michael and Mickey Shkatov - Extras.zip34.59 MB
- Fatih Ozavci - UpdatedDEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones-UPDATED.pdf33.79 MB
- Colby Moore and Patrick Wardle - UpdatedDEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam-Updated.pdf30.18 MB
- Dominic White and Ian de Villiers - UpdatedDEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdf30.16 MB
- Kenneth White and Matthew Green - UpdatedDEFCON-22-Kenneth-White-and-Matthew-Green-The-Open-Crypto-Audit-Project-Updated.pdf30.06 MB
- Andrew Hunt - UpdatedDEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise-UPDATED.pdf26.32 MB
- Brian Gorenc and Matt Molinyawe -UpdatedBrian Gorenc and Matt Molinyawe - Extras.zip26.09 MB
- Glenn Wilkinson - UpdatedDEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance-UPDATED.pdf25.96 MB
- Rmellendick and DaKahuna - UpdatedDEFCON-22-Rmellendick-Dakahuna-RF-Penetration-Testing-Your-Air-Stinks-UPDATED.pdf25.06 MB
- Phil Polstra - UpdatedDEFCON-22-Phil-Polstra-Am-I-Being-Spied-On-Updated.pdf22.21 MB
- Brian Gorenc and Matt Molinyawe -UpdatedDEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly-UPDATED.pdf19.84 MB
- Zoz - UpdatedDEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdf19.21 MB
- Deviant Ollam and Howard PayneDEFCON-22-Deviant-Ollam-and-Howard-Payne-Elevator Hacking-From-the-Pit-to-the-Penthouse.pdf18.52 MB
- Andrew Hunt - UpdatedDEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise.pdf17.25 MB
- Jim Denaro and Tod Beardsley - UpdatedDEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit-UPDATED.pdf17.04 MB
- Zoz - UpdatedDEFCON-22-Zoz-Dont-Fuck-It-Up.pdf16.74 MB
- Sarah EdwardsDEFCON-22-Sarah-Edwards-Reverse-Engineering-Mac-Malware.pdf15.12 MB
- Alijohn Ghassemlouei - UpdatedDEFCON-22-Alijohn-Ghassemlouei-Anatomy-of-a-Pentest-Updated.pdf14.74 MB
- Grant Bugher - UpdatedDEFCON-22-Grant-Bugher-Detecting-Bluetooth-Surveillance-Systems-Updated.pdf13.99 MB
- Kyle Kelley and Greg Anderson - UpdatedDEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe.-Updated.pdf11.72 MB
- Bathurst, Rogers, Carey, and ClarkeDEFCON-22-Bathurst-Rogers-Carey-Clarke-PROPLANE.pdf11.01 MB
- Grant Bugher - UpdatedDEFCON-22-Grant-Bugher-Detecting-Bluetooth-Surveillance-Systems.pdf10.94 MB
- Adrian Crenshaw - UpdatedDEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf10.77 MB
- Josh Datko and Teddy Reed - UpdatedDEFCON-22-Josh-Datko-Teddy-Reed-NSA-Playset-DIY-Hardware-Implant-over-l2c-UPDATED.pdf10.3 MB
- Aaron Bayles (AlxRogan) - UpdatedDEFCON-22-Aaron-Bayles-Alxrogan-Protecting-SCADA-DC101.pdf9.39 MB
- Alex Pinto and Kyle Maxwell - UpdatedDEFCON-22-Pinto-Maxwell-Secure-Because-Math-Updated.pdf9.37 MB
- Tim Strazzere and Jon Sawyer - UpdatedDEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdf8.88 MB
- John Menerick - UpdatedDEFCON-22-John-Menerick-Open-Source-Fairy-Dust-UPDATED.pdf8.75 MB
- Jake Kouns & Carsten Eiram - UpdatedDEFCON-22-Kouns-Eiram-Screw-Becoming-A-Pentester-Bug-Bounty-Hunter-U{DATED.pdf8.66 MB
- Alex Pinto and Kyle Maxwell - UpdatedDEFCON-22-Pinto-and-Maxwell-Measuring-the-IQ-of-your-threat-feeds-TIQtest-Updated.pdf8.62 MB
- Bulygin, Bazhaniul, Furtak, and Loucaides - UpdatedDEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS.pdf8.59 MB
- Gregory Pickett - UpdatedDEFCON-22-Gregory-Pickett-Abusing-Software-Defined-Networks-UPDATED.pdf8.29 MB
- Robert RowleyDEFCON-22-Robert-Rowley-Detecting-Defending-Against-Surveillance-State.pdf8.12 MB
- Nir Valtman - UpdatedDEFCON-22-Nir-Valtman-Bug-Bounty-Programs-Evolution.pdf8.07 MB
- Phillip Young - UpdatedDEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes-Updated.pdf7.9 MB
- Colby Moore and Patrick Wardle - UpdatedDEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam.pdf7.85 MB
- Blake Self - UpdatedDEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdf7.16 MB
- Eric (XlogicX) Davisson and Ruben Alejandro (chap0)DEFCON-22-Eric-Davisson-Ruben-Alejandro-Abuse-of-Blind-Automation-in-Security-Tools.pdf6.83 MB
- Ivan Petrov and Svetlana Gaivoronski - UpdatedDEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM.pdf6.71 MB
- Joe Fitzpatrick and Miles Crabill - UpdatedDEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe.pdf6.59 MB
- Ivan Petrov and Svetlana Gaivoronski - UpdatedDEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM-Updated.pdf6.29 MB
- Ryan Kazanciyan and Matt Hastings - UpdatedDEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks-UPDATED.pdf6.28 MB