Drop your file here to upload it

Create a new directory

files/torrents/CypherCon/CypherCon 2.0 2017/

NameSizeLast modification

Parent directory

CypherCon 2.0 2017 captions/

2026-03-10 01:14:43 +13:00 a week ago

A Look Behind the Scenes of DEFCON DarkNet Ed Abrams zeroaltitude Demetrius Comes cm.mp416.3 MiBa week ago

16.3 MiB2026-03-10 01:14:41 +13:00 a week ago

A Look Behind the Scenes of DEFCON DarkNet Part II Part II Ed Abrams zeroaltitude De.mp419.6 MiBa week ago

19.6 MiB2026-03-10 01:14:41 +13:00 a week ago

Badge Panel.mp447.5 MiBa week ago

47.5 MiB2026-03-10 01:14:41 +13:00 a week ago

Badges.mp45.5 MiBa week ago

5.5 MiB2026-03-10 01:14:41 +13:00 a week ago

Beyond the Fringe Anomalies of Consciousness Experience and Scientific Research Rich.mp437.2 MiBa week ago

37.2 MiB2026-03-10 01:14:41 +13:00 a week ago

Brain Based Authentication Melanie Segado Sydney Swaine Simon.mp423.2 MiBa week ago

23.2 MiB2026-03-10 01:14:41 +13:00 a week ago

Can Cryptography Frustrate Fascism Phillip Rogaway.mp433.1 MiBa week ago

33.1 MiB2026-03-10 01:14:41 +13:00 a week ago

Closing Ceremony - Organizors.mp411.4 MiBa week ago

11.4 MiB2026-03-10 01:14:41 +13:00 a week ago

Cluster Cracking Passwords MDXfind Robert Reif.mp424.2 MiBa week ago

24.2 MiB2026-03-10 01:14:41 +13:00 a week ago

Does DoD Level Security Work in the Real World Jeff Man.mp439.9 MiBa week ago

39.9 MiB2026-03-10 01:14:41 +13:00 a week ago

Espionage Soviet MiGs Dave Roebke.mp419.8 MiBa week ago

19.8 MiB2026-03-10 01:14:41 +13:00 a week ago

Explore Wisconsin Hacker History Brad Swanson.mp419.0 MiBa week ago

19.0 MiB2026-03-10 01:14:41 +13:00 a week ago

Forensic Deconstruction of Databases through Direct Storage Carving Dr Alexander Ras.mp426.5 MiBa week ago

26.5 MiB2026-03-10 01:14:41 +13:00 a week ago

From zero to Bender in 12 months how a software guy turned hardware Zapp.mp439.0 MiBa week ago

39.0 MiB2026-03-10 01:14:42 +13:00 a week ago

Hijinks.mp46.8 MiBa week ago

6.8 MiB2026-03-10 01:14:42 +13:00 a week ago

IoT Security Privacy Weaknesses Ransomware Rick Ramgattie.mp413.3 MiBa week ago

13.3 MiB2026-03-10 01:14:42 +13:00 a week ago

JavasCrypto How we are using browsers as Cryptographic Engines Kat Traxler.mp412.2 MiBa week ago

12.2 MiB2026-03-10 01:14:42 +13:00 a week ago

KEYNOTE STEHM is the new STEM David Heal Schwartzberg.mp423.7 MiBa week ago

23.7 MiB2026-03-10 01:14:42 +13:00 a week ago

KEYNOTE The History of Video Game Console Hacking Dan Loosen.mp455.9 MiBa week ago

55.9 MiB2026-03-10 01:14:42 +13:00 a week ago

Naked and Vulnerable A Cybersecurity Starter Kit Shannon Fritz.mp430.2 MiBa week ago

30.2 MiB2026-03-10 01:14:42 +13:00 a week ago

No Post 104 Modern Evasion Techniques Jason Lang.mp440.5 MiBa week ago

40.5 MiB2026-03-10 01:14:42 +13:00 a week ago

Predictive Analytics and Machine Learning Real Use Cases for ITSecurity Professional.mp441.8 MiBa week ago

41.8 MiB2026-03-10 01:14:42 +13:00 a week ago

Protecting Passwords with Oblivious Cryptography Adam Everspaugh.mp418.7 MiBa week ago

18.7 MiB2026-03-10 01:14:42 +13:00 a week ago

The Upside Down Going from NetSec to AppSec Cody Florek.mp416.9 MiBa week ago

16.9 MiB2026-03-10 01:14:42 +13:00 a week ago

Threat Intelligence 101 Basics without Buzzwords M4ninBl4ck.mp416.1 MiBa week ago

16.1 MiB2026-03-10 01:14:43 +13:00 a week ago

TrackingMonitoring WiFi devices without being connected to any network Caleb Madriga.mp421.8 MiBa week ago

21.8 MiB2026-03-10 01:14:43 +13:00 a week ago

Wasnt DLP supposed to fix this Amit Riswadkar FeMaven.mp47.3 MiBa week ago

7.3 MiB2026-03-10 01:14:43 +13:00 a week ago

Wireless Capture the Flag Eric Escobar.mp411.9 MiBa week ago

11.9 MiB2026-03-10 01:14:43 +13:00 a week ago

WordPress polyfills for PHP John Jacoby.mp419.1 MiBa week ago

19.1 MiB2026-03-10 01:14:43 +13:00 a week ago

Starting upload...