About 52 results for "UC6Om9kAkl32dWlDSNlDS9Iw"
Featured Results

DEF CON 33 - Cash, Drugs, and Guns - Why Your Safes Aren't Safe - Mark Omo, James Rowley
DEFCONConferenceOct 24, 2025
DEF CON 33 - Carding, Sabotage & Survival: A Darknet Market Veteran’s Story - Godman666
DEFCONConferenceOct 23, 2025
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis
DEFCONConferenceOct 22, 2025
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh
DEFCONConferenceOct 15, 2025
DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - Carl Miller, Chris Monteiro
DEFCONConferenceOct 15, 2025
PT55M52S
DEF CON 33 - How NOT to Perform Covert Entry Assessments - Brent White, Tim Roberts
DEFCONConferenceOct 10, 2025
PT43M43S
DEF CON 33 - Building the first open source hackable Quantum Sensor - Mark Carney, Victoria Kumaran
DEFCONConferenceOct 10, 2025
PT35M12S
DEF CON 33 - China's 5+ year campaign to penetrate perimeter network defenses - Andrew Brandt
DEFCONConferenceOct 10, 2025
PT20M44S
DEF CON 33 - How AI + Hardware can Transform Point of Care Workflows - PamirAI
DEFCONConferenceOct 10, 2025
PT25M36S
DEF CON 33 - Hacking Space to Defend It: Generating IoBs with SPARTA - Brandon Bailey
DEFCONConferenceOct 10, 2025
DEF CON 32 - Top War Stories from a TryHard Bug Bounty Hunter -Justin Rhynorater Gardner
DEFCONConferenceDec 15, 2024
DEF CON 32 -Your Smartcard is Dumb A Brief History of Hacking Access Control Systems - Chad Shortman
DEFCONConferenceDec 15, 2024
PT36M55S
DEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashing
DEFCONConferenceDec 15, 2024
DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini
DEFCONConferenceNov 27, 2024
DEF CON 32 - Gotta Cache ‘em all bending the rules of web cache exploitation - Martin Doyhenard
DEFCONConferenceNov 26, 2024
DEF CON 32 - Efficient Bug Bounty Automation Techniques - Gunnar Andrews
DEFCONConferenceNov 26, 2024
DEF CON 32 - What To Expect When You’re Exploiting: 0Days Baby Monitors & Wi-Fi Cams - Mager, Forte
DEFCONConferenceNov 1, 2024
PT36M20S
DEF CON 32 - Behind Enemy Lines: Going undercover to breach LockBit Ransomware Op- Jon DiMaggio
DEFCONConferenceOct 16, 2024
PT39M24S
DEF CON 32 - Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ - Joseph Cox
DEFCONConferenceOct 16, 2024
PT24M58S
DEF CON 32 - Hacking Millions of Modems and Investigating Who Hacked My Modem - Sam Curry
DEFCONConferenceOct 16, 2024
DEF CON 31 - Warshopping- Phreaking Smart Shopping Cart Wheels Through RF Sniffing - Joseph Gabay
DEFCONConferenceDec 15, 2023
DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards - Bertocchi, Campbell, Gibson, Harris
DEFCONConferenceDec 15, 2023
DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin
DEFCONConferenceDec 15, 2023
DEF CON 31 - Backdoor in the Core - Altering Intel x86 Instruction Set at Runtime - Krog, Skovsende
DEFCONConferenceDec 13, 2023Swipe to view more pages






