| Video | ID | Length | Size |
| - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain | W5B-zjaDzfU | 22:42 | 114M |
| 3D Printing Presentation from Dr3t of DC719 | oUY8aQqCSRU | 13:52 | 58M |
| Adam - Security to Make the CFO Happy - DEF CON 27 Packet Hacking Village | 8LfcgPWtV78 | 18:55 | 102M |
| Adrian Korn - The OSINT space is Growing Are we Ready video - DEF CON 27 Recon Village | nH3b7lNcl2E | 28:43 | 116M |
| albinowax - HTTP Desync Attacks: Smashing into the Cell Next Door - DEF CON 27 Conference | w-eJM2Pc0KI | 41:32 | 383M |
| Alex Jay Balan - Next gen IoT Botnets 3 moar ownage - DEF CON 27 IoT Village | CjOlzH8Jhs8 | 40:55 | 113M |
| Alexandre Borges - .NET Malware Threats: Internals And Reversing - DEF CON 27 Conference | UB3pVTO5izU | 48:09 | 228M |
| Ali Islam - Weaponizing Hypervisors to Beat Car and Medical Device Attacks - DEF CON 27 Conference | Pgqk5YdDabU | 52:34 | 558M |
| Alina Dorina - Using Cloud Services for Dial In Reconnaissance Automation - DEF CON 27 Recon Village | CZwm3PcxDOs | 21:57 | 99M |
| Alon Weinberg - Please Inject Me, a x64 Code Injection - DEF CON 27 Conference | dKrNJhbGgHY | 17:35 | 136M |
| Alvaro Muñoz - SSO Wars: The Token Menace - DEF CON 27 Conference | ObxxXU8GRMI | 37:29 | 233M |
| Amit Elazari - Regulatory Trends in IoT and impact on research community - DEF CON 27 IoT Village | zhJomUeVW94 | 35:42 | 255M |
| Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference | 86HwtH2v14w | 48:42 | 211M |
| Andres Blanco - Love is in the Air video - DEF CON 27 Wireless Village | q5vf_BJj52g | 24:35 | 96M |
| Andrew Nicholson - Hacking Hollywood - DEF CON 27 Social Engineering Village | 4LdwU71Gpi4 | 29:21 | 104M |
| Andrew T - BITFI You Wouldnt Steal My Cloins - DEF CON 27 IoT Village | W8bTI7QZI3g | 28:45 | 190M |
| Andrew Tierney - Pwning a mobile drilling rig Hacking an oil rig - DEF CON 27 Hack the Sea Village | JoJ6uzIsQNs | 27:44 | 234M |
| Androsia Securing data in process for your Android Apps - Samit Anwer - DEF CON China Beta | 1GoXnRpp0cQ | 45:29 | 151M |
| Andy Grant - Unpacking Pkgs A Look Inside MacOS Installer Packages - DEF CON 27 Conference | kCXhIYtODBg | 22:08 | 149M |
| Anish Athalye - Want Strong Isolation Just Reset Your Processor - DEF CON 27 Conference | AgCNPc5RfL8 | 44:18 | 234M |
| Anthony Rose - Hack to Basics Adapting Exploit Frameworks to Evade Micros - DEF CON 27 Recon Village | apooENo_riY | 30:41 | 224M |
| Ariel Herbert Voss - Dont Red Team AI Like a Chump - DEF CON 27 Conference | ivlc1yPw76A | 28:40 | 289M |
| Babak Javadi - Basics of Hacking Physical Access Control Systems - DEF CON 27 Wireless Village | LS5OQHUJaJE | 01:02:52 | 375M |
| Ben Brecht - MITM mixed mode butterfly key privacy attack - DEF CON 27 Crypto and Privacy Village | uhbKB_5u6jE | 32:53 | 203M |
| Ben Sadeghipour - Owning The Clout Through Server Side Request Forgery - DEF CON 27 Conference | o-tL9ULF0KI | 28:36 | 176M |
| Bernhard Mueller - The Ether Wars Exploits counter exploits and honeypots - DEF CON 27 Conference | Qd9ubry-c_M | 47:42 | 278M |
| Bertin Bervis - Mixing industrial protocols with web application security - DEF CON 27 IoT Village | TFkm0EN3Azk | 37:43 | 221M |
| Besim ALTINOK - edu driving - DEF CON 27 Wireless Village | tfF9sCr9Cec | 29:28 | 135M |
| Besim Altinok - Wi Fi Threat Modeling and Monitoring - DEF CON 27 Packet Hacking Village | pfkConx9j-s | 43:50 | 185M |
| Bill Demirkapi - Are Your Childs Records at Risk The Current State of School - DEF CON 27 Conference | HTj6zZd2jXE | 42:13 | 411M |
| Bill Graydon - Duplicating Restricted Mechanical Keys - DEF CON 27 Conference | ij0c-236O0k | 46:19 | 300M |
| Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference | vQtLms02PFM | 41:17 | 192M |
| Billy Boatright - Swing Away Conquer Impostor Syndrome - DEF CON 27 Social Engineering Village | uIhQhAu7EYk | 26:36 | 220M |
| Blasted Bits - ZOZ - DEF CON China Beta | 1abx5kqOnG8 | 59:07 | 276M |
| Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling - DEF CON 27 Conference | pq9t0VEIMio | 39:03 | 500M |
| Brent Stone - Reverse Engineering 17+ Cars in Less than 10 Minutes - DEF CON 27 Conference | KkgxFplsTnM | 17:46 | 72M |
| Brian Satira - Opening Remarks - DEF CON 27 Hack the Sea Village | WonKnDVpmQ8 | 06:07 | 29M |
| Bruce Schneier - Information Security in the Public Interest - DEF CON 27 Conference | G0WRV7gosRA | 42:47 | 922M |
| Bug Crowd - Lets get technical and hunt harder video - DEF CON 27 Recon Village | zj50_lMV-pI | 31:28 | 137M |
| Bugs Aren't Random Unifying Building & Breaking in Modern Age - Dan Kaminsky - DEF CON China Beta | f3cyCg7itOI | 01:00:43 | 271M |
| Campbell Murray - GSM We Can Hear Everyone Now - DEF CON 27 Conference | YlqJCPk2OvQ | 38:24 | 169M |
| Cat Murdock - Black Mirror You are yr own privacy nightmare - DEF CON 27 Crypto and Privacy Village | Gg0M0BjWvE0 | 53:29 | 347M |
| Cathie Yun - Implementing a Zero Knowledge Proof - DEF CON 27 Crypto and Privacy Village | sOKh7WQgwpw | 38:06 | 168M |
| Cesare Pizzi - Sandbox Creative Usage For Fun and Problems - DEF CON 27 Packet Hacking Village | rwEUY2p7WOI | 21:10 | 122M |
| Cheryl Biswas - Patching It is Complicated - DEF CON 27 Packet Hacking Village | 8VrzovOrho8 | 36:54 | 170M |
| Chris Hadnagy - SEVillage 10 Year Anniversary a Look Back - DEF CON 27 Social Engineering Village | b8hrjSef0E8 | 51:38 | 396M |
| Chris Hanlon - TLS decryption attacks and back doors - DEF CON 27 Crypto and Privacy Village | YG33kAaFs6Q | 30:56 | 183M |
| Chris Kirsch - Psychic Cold Reading Techniques - DEF CON 27 Social Engineering Village | BCxBkBzQrzs | 32:08 | 226M |
| Chris Pritchard - The Basics of Social Engineering - DEF CON 27 Social Engineering Village | tCRT3QFzwm8 | 24:36 | 193M |
| Christian Paquin - Migrating to quantum safe crypto - DEF CON 27 Crypto and Privacy Village | IqCw19bKE6c | 25:34 | 152M |
| Christopher Roberts - Firmware Slap Automating Discovery Exploitable Vulns - DEF CON 27 Conference | YwEQt4i_AUo | 32:47 | 291M |
| Christopher Wade - Tag side attacks against NFC - DEF CON 27 Conference | OQVz7y2EyHM | 35:52 | 233M |
| Contests and Events - Contests Awards Ceremony video - DEF CON 27 Conference | PNDlM0RbtX4 | 01:00:52 | 864M |
| Cris DeWitt - Maritime Cyber Policy Panel - DEF CON 27 Hack the Sea Village | PemUvR1-iAo | 42:32 | 410M |
| Cult of the Dead Cow - Change the World, cDc Style - DEF CON 27 Conference | tr4PEQ-g7r8 | 46:19 | 566M |
| D9 - Hacking Corporate Org Socialization - DEF CON 27 Packet Hacking Village | JsyEHGepP7w | 51:50 | 188M |
| Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming - DEF CON 27 Conference | wkIdpK7mAk4 | 37:14 | 455M |
| Daniel Crowley - Key Search Attacks Against Modern Symmetric Ciphers - DEF CON 27 Conference | ubzNkvq6lVo | 49:05 | 500M |
| Daniel Isler - The Voice Told Me To Do It - DEF CON 27 Social Engineering Village | 3ngeKL06Ph4 | 27:46 | 174M |
| Daniel Romero - Why You Should Fear Your mundane Office Equipment - DEF CON 27 Conference | 3X-ZnlyGuWc | 44:54 | 481M |
| Daniel Wegemer - Fitbit Firmware Hacking The Current State of the Heart - DEF CON 27 IoT Village | Pycp5b_EPTY | 43:29 | 173M |
| DC30 DCGVR - How To Start And Run A DEF CON Group | NbB2Keq3WFw | 59:51 | 349M |
| DC30 DCGVR Talks - AWS Metadata Privilege Escalation | DkTh_Zptu-Y | 30:28 | 142M |
| DC30 DCGVR Talks - Fun with bookmarks | Z82FSqCO9U0 | 31:33 | 150M |
| DC30 DCGVR Talks - Advanced Packet Wrangling With TCPdump | LloLFZtMyEA | 38:08 | 219M |
| DC30 DCGVR Talks - Careful Who You Colab With | qWJKL5xk6kU | 29:21 | 133M |
| DC30 DCGVR Talks - Glitter Nail Polish vs the Evil Maid | euOGB3GR7oo | 31:56 | 161M |
| DC30 DCGVR Talks - How getting a free phone got me to report critical vulns | njxybInmIX4 | 50:03 | 251M |
| DC30 DCGVR Talks - When FireFox Gets Angry | BIkHLDB008g | 01:26:39 | 396M |
| DC801 Group Spotlight | 4ZrjuNIOdb0 | 13:55 | 400M |
| DEF CON - Brian Gorenc. Fritz Sands - State of the Union for SCADA HMI Vulnerabilities | t3EHOA5fpYk | 44:20 | 171M |
| DEF CON - Panel - Guests N Goblins: Exposing Wi Fi Exfiltration Risks and Mitigation | H_Kp7Bul4I0 | 33:19 | 100M |
| DEF CON 11 - Gregoire Gentil - Hack Any Website | bYP9DLPzkRU | 21:44 | 33M |
| DEF CON 12 - Bev Harris & Rebecca Mercuri, Part 2 - Hack the Vote: Election 2004 | iQut9nqH8SI | 01:03:41 | 116M |
| DEF CON 12 - Doug Mohney, DIGEX At the Dawn of the Commercial Internet | uxMq-x9rlJM | 45:46 | 89M |
| DEF CON 12 - Fingerprinting with Morph | GK-eiV_NuGg | 50:28 | 117M |
| DEF CON 12 - FX and Halvar - Take it from here | Jwot7S6NmLE | 02:12:24 | 234M |
| DEF CON 12 - Gene Cronk, IPv6 Primer | SfF0LssVk1E | 43:51 | 95M |
| DEF CON 12 - Greg Conti, Network Attack Visualization | XATakIdyZdk | 50:24 | 105M |
| DEF CON 12 - Grifter, Russ Rogers and Tierra, Project Prometheus | S8ZdDGRuFLM | 50:08 | 87M |
| DEF CON 12 - h1kari,Smart Card Security: From GSM to Parking Meters | C41jp9S50eg | 51:45 | 1M |
| DEF CON 12 - Ian Clarke, Freenet: Taming the World's Largest Tamagotchi | YAOhLkWpNWE | 51:15 | 99M |
| DEF CON 12 - Ian Vitek, Exploring Terminal Services, The Last 12 Month of Research. | 9bqKOd3fcM8 | 47:35 | 100M |
| DEF CON 12 - IcE tRe, Virus, Worms and Trojans: Where are we going? | VuZekLpVNs8 | 30:40 | 69M |
| DEF CON 12 - j0hnny long, Google Hacking- The Return of the Googledorks | 1U66eEpSysE | 40:58 | 69M |
| DEF CON 12 - Jamie Butler,VICE - Catch the Hookers! | HKlgJzms8yQ | 41:45 | 76M |
| DEF CON 12 - Jason Scott, Digitizations And Documentary | L5JlGJ0CHeA | 50:43 | 90M |
| DEF CON 12 - Jesee Krembs and Nicholas Farr, The Hacker Foundation: An Introduction | faazFI_M2j0 | 26:11 | 48M |
| DEF CON 12 - Jon Callas, How Do We Get The World To Use Message Security | qL4a7N_EEfg | 48:27 | 95M |
| DEF CON 12 - Jon Callas, How Do We Get The World To Use Message Security | s7WNKX_cNyw | 48:48 | 95M |
| DEF CON 12 - Joshua Teitelbaum and Peter Leung, CryptoMail Encrypted E-Mail for All | RdORT6bbmgw | 33:00 | 76M |
| DEF CON 12 - Kevin Mahaffey, Smile, You're on Candid Camera | M123pK8RvBA | 11:38 | 19M |
| DEF CON 12 - Len Sassaman, Mixmaster vs. Reliable: A Comparison of Two Anonymous Remailers | hotqSaYZDw4 | 48:36 | 111M |
| DEF CON 12 - Lucky 225, Phreaking in the Age of Voice Over IP | s0nhHlLQAZA | 29:02 | 55M |
| DEF CON 12 - Lukas Grunwald, RF-ID and Smart-Labes: Myth, Technology and Attacks | TdSeqaowT7k | 30:57 | 58M |
| DEF CON 12 - Max Mullen - Hack Your Car | l6lcDFKhBnQ | 36:14 | 65M |
| DEF CON 12 - Maximillian Dornseif, Far More Than You Ever Wanted To Tell | O_uKvi-fwhI | 51:18 | 91M |
| DEF CON 12 - Michael Rash, Advanced Netfilter; Content Replacement (ala Snort_inline) | DPo7eeq0JuE | 51:44 | 109M |
| DEF CON 12 - Michael T. Raggo , Steganography, Steganalysis and Cryptanalysis | ITBCkzEat40 | 34:11 | 61M |
| DEF CON 12 - n0namehere, Real World Privacy, How to Leave Less of A Trail in Life | mcAy53PsnXs | 46:34 | 101M |
| DEF CON 12 - Nathan Hamiel (Ichabod Ver7),Down with the RIAA | bAnyTn8PzE4 | 45:23 | 92M |
| DEF CON 12 - Ne0nRa1n - Better than Life - Manipulation of The Human Brain With The Use of Machines | gKrYvgwwjxg | 55:05 | 105M |
| DEF CON 12 - Nothingface, Automotive Networks | xboQgRMTN3w | 46:49 | 83M |
| DEF CON 12 - Panel - Meet the Feds | YE2XzttRi1Y | 39:16 | 64M |
| DEF CON 12 - Panel, Ask EFF: Discussion and Q⧸A on the State of Digital Liberties | 6zNfmUSKj3E | 01:48:16 | 175M |
| DEF CON 12 - Richard Thieme,Quantum Hacking: In Search of a Unified Theory | WYgl6Rs2y9o | 20:19 | 32M |
| DEF CON 12 - Sarah Gordon,What Do You Mean, Privacy? | 1iq9w5Tn_DQ | 15:23 | 30M |
| DEF CON 12 - Scott Fullam, Introduction to Hardware Hacking | vBvY-2hXyAY | 41:23 | 81M |
| DEF CON 12 - Sean O'Toole, Mutating the Mutators | uUMGwAenAzA | 12:52 | 27M |
| DEF CON 12 - Sensepost, When the Tables Turn | GoxRlMHeO4M | 47:20 | 94M |
| DEF CON 12 - spoonm and HD Moore, Bubonic Buffer Overflow | bsiVl_dqka0 | 01:06:40 | 130M |
| DEF CON 12 - The Shmoo Group - Wireless Weaponry | RtEsqbhX1Us | 35:45 | 76M |
| DEF CON 12 - Todd Moore, Cracking Net2Phone | NmAdquDqa5I | 13:57 | 25M |
| DEF CON 12 - Tony Arcieri, PDTP :The Peer Distributed Transfer Protocol | EvRtzVlnYr4 | 38:58 | 84M |
| DEF CON 12 - Tzi-cker Chiueh, Program Semantics Aware Intrusion Detection | nd3QMeHmcRM | 38:54 | 86M |
| DEF CON 12 - Wendy Seltzer and Seth Schoen, Hacking the Spectrum | J1WBInenXH0 | 48:01 | 82M |
| DEF CON 12 -Nick Mathewson, Snake Oil Anonymity: How To Spot It, And How Not To Write It | 5Go34e4RXLc | 40:51 | 85M |
| DEF CON 12 -Thorsten Holz and Others - NoSEBrEaK Defeating Honeynets | IcjLdwxKeeg | 54:39 | 1M |
| DEF CON 13 - Alex Stamos & Scott Stender, Attacking Web Services | jrKC3N4-ONg | 01:43:51 | 244M |
| DEF CON 13 - Alexey Smirnov & Tzi-cker Chiueh, DIRA: Automatic Detection | 3bqHd7JZlo4 | 55:36 | 121M |
| DEF CON 13 - Ben Kurtz, A Linguistic Platform for Threat Development | 1hJAEJNxlN0 | 50:06 | 69M |
| DEF CON 13 - Broward Horne, Meme Mining for Fun and Profit | B0PGHXcs6O4 | 52:00 | 96M |
| DEF CON 13 - Christian Grothoff, Lost In Translation | QY0icR--2gI | 31:30 | 55M |
| DEF CON 13 - Chuck Willis, Trends in Licensing of Security Tools | yKQGdtpjoa4 | 49:42 | 89M |
| DEF CON 13 - CISO Q&A with Dark Tangent | wLQNs0vqxsk | 50:56 | 104M |
| DEF CON 13 - Dan Kaminsky, Black Ops of TCP 2005 | hA_fKQo_ovE | 01:02:58 | 113M |
| DEF CON 13 - Daniel Burroughs, Auto-adapting Stealth Communication Channels | awG8-KiHPAQ | 29:21 | 53M |
| DEF CON 13 - Daniel Burroughs, Development of An Undergraduate Security Program | evRnPybzMPw | 29:46 | 55M |
| DEF CON 13 - David Cowan - The Information Security Industry: $3 Billion of Snake Oil | 1QC6TdhYcEQ | 50:39 | 96M |
| DEF CON 13 - David Hulton, The Next Generation of Cryptanalytic Hardware | IRTZTktq8mg | 41:16 | 74M |
| DEF CON 13 - Dean Pierce, Brandon Edwards & Anthony Lineberry, Bypassing Authenticated Wireless | Cwi8VZn0Egc | 14:23 | 24M |
| DEF CON 13 - Defcon Panel Discussion of regional DC Groups | e98YT5TB210 | 47:05 | 83M |
| DEF CON 13 - Deral Heiland, The Insecure Workstation II "Bob Reloaded" | Ni4LlXQxbBo | 39:11 | 74M |
| DEF CON 13 - Deviant Ollam, Introduction to Lockpicking and Physical Security | IQ6QzsRKpQU | 02:23:45 | 274M |
| DEF CON 13 - Elizabeth Stark & Fred Benenson, The Revolution Will Not Be Copyrighted | yaFzUiCagik | 57:12 | 106M |
| DEF CON 13 - Elizabeth Stark and Fred Benenson - The Revolution Will Not Be Copyrighted | ZEj25yGvuQk | 48:31 | 93M |
| DEF CON 13 - Fyodor, Hacking Nmap | V2BXeMTfrt0 | 42:09 | 85M |
| DEF CON 13 - Greg Conti, Countering Denial of Information Attacks | ILYDLSkRwZ8 | 44:45 | 77M |
| DEF CON 13 - Ian Clarke & Oskar Sandberg, Routing in the Dark | -AyNbPwg0BI | 47:55 | 84M |
| DEF CON 13 - Jason Scott, Why Tech Documentaries are Impossible | 8FP3o_L_Ujo | 01:03:33 | 146M |
| DEF CON 13 - Jay Beale, Introducing the Bastille Hardening Assessment Tool | wdnb2GL9Jxs | 47:30 | 88M |
| DEF CON 13 - Jennifer Granick, Top Ten Legal Issues in Computer Security | WNsKYEoKmFA | 01:17:27 | 158M |
| DEF CON 13 - Jim Christy and various other Feds, Meet the Fed | 7Vi956UVRcg | 49:13 | 97M |
| DEF CON 13 - Jim "FalconRed" Rennie, Licensing Agreements 101: The Creative Commons License | Bmsmzc4cxtY | 45:36 | 81M |
| DEF CON 13 - jives, Passive Host Auditing | eOirJfpnIU8 | 24:12 | 39M |
| DEF CON 13 - Johnny Long, Death of a Thousand cuts - Forensics | ZVpZwKHLEH4 | 36:37 | 66M |
| DEF CON 13 - Johnny Long, Google Hacking for Penetration Testers | fo1BR9itwOY | 49:54 | 87M |
| DEF CON 13 - Jonathan Levin, The Dark side of Winsock | 6r-p-ryBMLU | 49:29 | 90M |
| DEF CON 13 - Julian Grizzard, Surgical Recovery from Kernel-Level Rootkit Installations | z55n-XgEQEY | 49:04 | 95M |
| DEF CON 13 - Kenneth Geers, Hacking in a Foreign Language: A Network Security Guide to Russia | FPo_ItdUNVs | 50:20 | 108M |
| DEF CON 13 - Kevin McCarthy, The Six Year Old Hacker: No More Script Kiddies | MXl0QiCRiW4 | 32:16 | 59M |
| DEF CON 13 - Keynote: Dr. Linton Wells | VYyDlGgAW6k | 59:20 | 122M |
| DEF CON 13 - Kristofer Erickson, The Power to Map: How Cyberspace Is Imagined Through Cartography | VxRV-_yDgyQ | 27:16 | 51M |
| DEF CON 13 - Leonard Gallion, A Safecracking Double Feature: Dial "B" For BackDialing | 5gMEFQbqE9g | 45:12 | 88M |
| DEF CON 13 - Major Malfunction, Old Skewl Hacking - InfraRed | 61Fo-zg-DqI | 48:03 | 85M |
| DEF CON 13 - Marc Weber Tobias & Matt Fiddler, Physical Security Bypass Techniques | b3uMDcZ0djQ | 44:56 | 113M |
| DEF CON 13 - Marshall Beddoe, Reverse Engineering Network Protocols using Bioinformatics | YLDWBSyjkAc | 55:51 | 96M |
| DEF CON 13 - Matthew L. Shuchman ("Pilgrim") , Building WarDriving Hardware Workshop | TOBX-xRBNjw | 37:50 | 70M |
| DEF CON 13 - Metalstorm, Trust Transience: Post Intrusion SSH Hijacking | KdjdN6gIHGs | 48:07 | 96M |
| DEF CON 13 - Mystic, Hacking the Mind (Influence and NLP) | h4dHmsxfROM | 52:17 | 101M |
| DEF CON 13 - NMRC Collective,The NMRC Warez 2005 Extravaganza | ZucV6IikHnI | 34:48 | 82M |
| DEF CON 13 - Ofir Arkin, A New Hybrid Approach for Infrastructure Discovery, Monitoring and Control | BUrm7ppmJOU | 53:20 | 95M |
| DEF CON 13 - Ofir Arkin, On the Current State of Remote Active OS Fingerprinting | sjzxM420_As | 35:22 | 61M |
| DEF CON 13 - Panel - Legal and Ethical Aspects of Wardriving | jUkGGQrpdXQ | 37:45 | 73M |
| DEF CON 13 - Patty L. Walsh, Muckraker, Hackers and the Media | pX_534X8vQE | 40:49 | 110M |
| DEF CON 13 - Paul Graham, Inequality and Risk | RpD_Sz_ZWPk | 26:53 | 48M |
| DEF CON 13 - Paul Vixie & Gadi Evron, Internet Survivability, Threats and Efforts | 8GNoomn7iuo | 58:38 | 101M |
| DEF CON 13 - Paul Vixie, The Internets March of Folly | FNxkQU7Z74I | 49:35 | 108M |
| DEF CON 13 - Philip R. Zimmermann, The Unveiling of My Next Big Project: ZPhone | d8bqbdfe-rU | 52:41 | 95M |
| DEF CON 13 - Raffael Marty, Visual Security Event Analysis | rOhkX3fPJb0 | 44:19 | 81M |
| DEF CON 13 - Raven, Pen-testing the Backbone | wQRIgUuXlfw | 49:48 | 116M |
| DEF CON 13 - Robert E. Lee & Jack C. Louis: Introducing Unicornscan - Riding the Unicorn | JOeHiUJ438Q | 44:50 | 74M |
| DEF CON 13 - Robert Morris, ATM Network Vulnerabilities | tkNuhnvm37c | 30:04 | 48M |
| DEF CON 13 - Robert "hack ajar" Imhoff-Dousharm,Credit Cards | M0P6oyNQZqg | 48:37 | 88M |
| DEF CON 13 - Roberto Preatoni & Fabio Ghioni, Assymetric Digital Warfare | 9Goy-8-E6Ig | 54:59 | 106M |
| DEF CON 13 - RS, Forensic Data Acquisition Tools | ZSgB1yfEQfY | 49:25 | 99M |
| DEF CON 13 - Sam Thingpen - From Cyberspace to Hyperspace | ac0rjtDCO04 | 33:13 | 56M |
| DEF CON 13 - Sensepost, Automation - Deus ex Machina or Rube Goldberg Machine? | 5D-BmblIymU | 01:24:24 | 152M |
| DEF CON 13 - Sherri Sparks & Jamie Butler, "Shadow Walker" - Raising The Bar For Rootkit Detection | Q89pjQ2kqow | 55:59 | 145M |
| DEF CON 13 - Shmoo Group - Shmoo-Fu: Hacker Goo, Goofs, and Gear with the Shmoo | vaWK3kOBFb8 | 01:15:22 | 136M |
| DEF CON 13 - StankDawg, Hacking Google AdWords | nzRN4_X4KtQ | 49:52 | 86M |
| DEF CON 13 - Steve Dunker Esq, The Hacker's Guide to Search and Arrest | v2aG5tulEo0 | 54:23 | 109M |
| DEF CON 13 - Strom Carlson & Black Ratchet, Be Your Own Telephone Company... With Asterisk | SWgmBi_9unY | 01:44:59 | 265M |
| DEF CON 13 - The Dark Tangent, Award Ceremonies | w09rbilifJU | 01:36:14 | 213M |
| DEF CON 13 - The Hacker Foundation, Doing Not-For-Profit Tech: The Hacker Foundation Year in Review | LPk91z-GJio | 48:13 | 68M |
| DEF CON 13 - Thomas J. Holt, No Women Allowed? Exploring Gender Differences In Hacking | M1s3Up2-rFA | 20:50 | 39M |
| DEF CON 13 - Tony Howlett, GeoIP Blocking, A Controversial But (Sometimes) Effective Approach | wV6S-grHF3E | 26:03 | 45M |
| DEF CON 13 - Wes Brown & Scott Dunlop, Mosquito - Secure Remote Code Execution Framework | vy8La7dt5v4 | 28:16 | 48M |
| DEF CON 13 - Wesley Tanner and Nick Lane-Smith: End-to-End Voice Encryption over GSM | qxTsadG3mAM | 41:59 | 80M |
| DEF CON 14 - Amber Schroader and Tyler Cohen - Cyber Crime Foiled Once Again? | eH2jv0rudR4 | 47:27 | 69M |
| DEF CON 14 - EFF: Panel: Ask EFF: The Year in Digital Civil Liberties | IVW7cAEXM9o | 52:41 | 205M |
| DEF CON 14 - EFF: PANEL: EFF v. AT&T: Your World, Delivered (to the NSA) | fY7cLC-bKpg | 50:35 | 241M |
| DEF CON 14 - James Christy: PANEL: Meet the Feds: 'OODA Loop and the Science of Security | na8n5EKXM-8 | 51:55 | 270M |
| DEF CON 14 - Johnny Long - Death by 1000 cuts | EPvK9XHFigQ | 53:30 | 140M |
| DEF CON 14 - Major Malfunction - Magstripe Madness | ITihB1c3dHw | 49:00 | 106M |
| DEF CON 14 - Marc Weber Tobias: Things That Go "Bump" in the night | a3Gzu9NSjNc | 42:35 | 95M |
| DEF CON 14 - Melanie Rieback: A Hacker's Guide to RFID Spoofing and Jamming | PVt_DyR-z5M | 50:08 | 136M |
| DEF CON 14 - Panel: Internet Wars 2006 | 5qg4KOX7adI | 01:42:02 | 243M |
| DEF CON 14 - Paul Simmonds: The Jericho Forum and Challenge | VN4NyIAdXQY | 42:01 | 148M |
| DEF CON 14 - Paul Vixie and David Dagon : Malware Repository Requirement | gR3qKxmnAOs | 51:40 | 125M |
| DEF CON 14 - Peleus Uhley: Kiosk Security | IXYpc38sgSQ | 48:02 | 82M |
| DEF CON 14 - Peter Gutmann: Phishing Tips and Techniques: Tackle, Rigging, and How & When to Phish | hsbgSWxX8Nc | 49:26 | 865K |
| DEF CON 14 - R.P. Murphy: Covert Channels using IPv6⧸ICMPv6 | Jzv0pljNTjo | 42:14 | 83M |
| DEF CON 14 - Raffael Marty: Visual Log Analysis - The Beauty of Graphs | zVjbKk5r53Q | 52:31 | 93M |
| DEF CON 14 - Renderman and Thorn - Church of Wifi | sB_MhLpm6PM | 42:59 | 50M |
| DEF CON 14 - Richard Thieme: Beyond Social Engineering: Tools for Reinventing Yourself | QquLPI29zzY | 53:25 | 242M |
| DEF CON 14 - Rick Hill: WarRocketing. Network Stumbling 50 sq. miles in less than 60 sec. | eorqtvFtq7M | 37:19 | 114M |
| DEF CON 14 - Rick Wesson: Abuse and the Global Infection Rate | nulUXnqKcW8 | 49:04 | 105M |
| DEF CON 14 - Robert Clark: Legal Aspects of Internet & Computer Network Defense - A Year in Review | 896QLoQljM8 | 52:35 | 88M |
| DEF CON 14 - Robert Clark: Legal Aspects of Internet & Computer Network Defense | RXHIyY3fWW8 | 01:15:52 | 203M |
| DEF CON 14 - Robert J. Hansen: Trust, But Verify: Auditing Proprietary DRE Systems | LvSfr2L53YI | 48:48 | 62M |
| DEF CON 14 - Scott Moulton: Rebuilding HARD DRIVES for Data Recovery; Anatomy of a Hard Drive | QNasotOQosI | 41:55 | 147M |
| DEF CON 14 - Seth Hardy: Your Name, Your Shoe Size, Your Identity? What do we Trust in this Web? | 5JtxaQdE2wc | 46:32 | 819K |
| DEF CON 15 - Aviv Raff and Iftach Ian Amit - The Inherent Insecurity of Widgets | 4-LPpm7Es2g | 48:04 | 52M |
| DEF CON 15 - Patrik Karlsson - SQL Injection | QzZyFcjQ25Y | 39:22 | 80M |
| DEF CON 17 - etd - Dradis Framework Sharing Information Will Get You Root | zEpG1Ugqgnc | 26:16 | 472K |
| DEF CON 17 - Kevin Johnson and Panel - Injectable Exploits | i6YJ5AcuBFU | 41:13 | 201M |
| DEF CON 17 - Pedro hkm Joaquin - Attacks Against 2wire Residential Gateway Routers | Tx0DivWaDkA | 15:53 | 44M |
| DEF CON 18 - Jack Daniel & Panel - PCI, Compromising Controls and Compromising Security | _zMYjApFWds | 56:38 | 116M |
| DEF CON 19 - Marcus J. Carey, David Rude and Will Vandevanter - Metasploit vSploit Modules | AT6OZcANdvU | 40:47 | 120M |
| DEF CON 19 - Nicholas J. Percoco, Sean Schulte - This is REALLY not the droid you're looking for... | 4WUkd8CR7Os | 32:01 | 59M |
| DEF CON 20 - Andrew King - Detecting Reflective Injection | ZB1yD8LlFns | 26:23 | 50M |
| DEF CON 20 - Ang Cui - Embedded Device Firmware Vulnerability Hunting Using FRAK | EKy_f-etWy8 | 21:58 | 66M |
| DEF CON 20 - Chema Alonso and Manu "The Sur"- Owning Bad Guys {And Mafia} With Javascript Botnets | xBvRNvKmVOw | 39:35 | 147M |
| DEF CON 20 - Chris Anderson - Drones! | lzYquLKj1oo | 51:10 | 284M |
| DEF CON 20 - Chris Conley - Bad (and Sometimes Good) Tech Policy: It's Not Just a DC Thing | YilCKh7T8Ro | 23:25 | 61M |
| DEF CON 20 - Chris Tarnovsky - Attacking TPM Part 2 A Look at the ST19WP18 TPM Device | Bp26rPw90Dc | 47:44 | 270M |
| DEF CON 20 - Chris "TheSuggmeister" Sumner and Randall Wald - Can Twitter Expose Psychopath Killers? | Zky9Nla3mRQ | 48:28 | 155M |
| DEF CON 20 - Christopher Soghoian - Can you track me now? | j23vcWqXUdw | 01:39:49 | 273M |
| DEF CON 20 - Conti, Shay and Hartzog - Life Inside a Skinner Box | 9g4dof07JwA | 46:20 | 90M |
| DEF CON 20 - Cory Docotorow - Beyond the War on General Purpose Computing Whats Inside the Box | 84zl75ODzHc | 23:07 | 61M |
| DEF CON 20 - Cutaway - Looking Into The Eye Of The Meter | tAJRHwRr2dk | 48:36 | 164M |
| DEF CON 20 - Dan Griffin - Hacking Measured Boot and UEFI | 9owW2q6SJew | 45:48 | 117M |
| DEF CON 20 - Dan Kaminsky - Black Ops | MQCinkFpW24 | 01:04:58 | 231M |
| DEF CON 20 - Dan Zulla - Improving Web Vulnerability Scanning | 7cgWrnPeIKs | 52:06 | 122M |
| DEF CON 20 - Darkred - Not-So-Limited Warranty: Target Attacks on Warranties for Fun and Profit | TbMAUT1cn9M | 09:21 | 56M |
| DEF CON 20 - Dave Brown - DIY Electric Car | e4pqdk-U2RE | 42:10 | 165M |
| DEF CON 20 - David "thelightcosine" Maloney - Weaponizing the Windows API | cZ-evXHTWIQ | 33:00 | 99M |
| DEF CON 20 - Eddie Lee - NFC Hacking: The Easy Way | eL_CdCWreOw | 34:06 | 102M |
| DEF CON 20 - egypt - Post Metasploitation Improving Accuracy and Efficiency | 7c5AdP1HEtk | 50:19 | 172M |
| DEF CON 20 - Elie Bursztein and Patrick Samy - Fuzzing Online Games | exs1ut5OEyA | 37:01 | 691K |
| DEF CON 20 - FX and Greg - Hacking [Redacted] Routers | U8fu05Em3Lg | 33:17 | 57M |
| DEF CON 20 - General Keith B. Alexander - Shared Values, Shared Responsibility | NP2ET9XqEPs | 48:54 | 192M |
| DEF CON 20 - Jason A. Novak and Andrea (Drea) London - SQL ReInjector | Ok0cNVulBRk | 33:35 | 146M |
| DEF CON 20 - Jason Ostrom, Karl Feinauer, William Borskey - The End of the PSTN As You Know It | -Sk0izFfPW0 | 50:01 | 172M |
| DEF CON 20 - Jayson E. Street - How to Channel Your Inner Henry Rollins | MVR1JzNAhRo | 17:36 | 37M |
| DEF CON 20 - Jeff Bryner - KinectasploitV2: Kinect Meets 20 Security Tools | 7NawiEI5tXA | 30:17 | 132M |
| DEF CON 20 - Jim Christy and Panel - Meet the Feds 1: Law Enforcement | jfG4RnmhrSE | 51:29 | 162M |
| DEF CON 20 - Jim Christy and Panel Meet the Feds 2: Policy R&D | E1GbqQ6Cg_c | 51:02 | 155M |
| DEF CON 20 - Jim Rennie, Jennifer Granick - MegaUpload: Guilty or Not Guilty | Y4SR1_1tmI0 | 48:55 | 114M |
| DEF CON 20 - Joe Grand and Zoz More Projects of Prototype This! | u93xykcu3Fs | 51:24 | 394M |
| DEF CON 20 - John Floren - Hellaphone: Replacing the Java in Android | EpTTU4lcR1Q | 36:59 | 74M |
| DEF CON 20 - Jonathan Brossard - Hardware Backdooring is Practical | MqbvxrJqrPU | 46:32 | 93M |
| DEF CON 20 - Josh Brashars - Exploit Archaeology: Raiders of the Lost Payphones | zn9GNdaXQDA | 49:22 | 119M |
| DEF CON 20 - Josh "m0nk" Thomas and Jeff "stoker" Robble - Off-Grid Communications with Android | sTpJuWcCsR0 | 50:01 | 124M |
| DEF CON 20 - Katy Levinson - Robots You're Doing It Wrong 2 | dQ6rgUXCP8Q | 49:50 | 189M |
| DEF CON 20 - Kenneth Geers - The Art of Cyberwar | alo7Fv6ywkc | 47:02 | 267M |
| DEF CON 20 - Kevin Poulsen - Answers Your Questions | 8s4b2ZKyPHc | 54:39 | 151M |
| DEF CON 20 - Linda C Butler - The Open Cyber Challenge Platform | BrEnn_j1PM8 | 20:13 | 72M |
| DEF CON 20 - LosT - Making the DEF CON 20 Badge | KaHvZ8tkeH4 | 45:39 | 102M |
| DEF CON 20 - Marc Weber Tobias, Matt Fiddler, and Tobias Bluzmanis - Safes and Containers | mu9USTP_0ZQ | 52:17 | 296M |
| DEF CON 20 - Mark Weatherford - The Christopher Columbus Rule and DHS | eKSZFY7ZTxo | 48:06 | 79M |
| DEF CON 20 - Marlinspike Hulton and Ray - Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2 | gkPvZDcrLFk | 29:37 | 162M |
| DEF CON 20 - Martin Gallo - Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol | 1YOPyHvhHUg | 40:08 | 110M |
| DEF CON 20 - Matthew Duggan - Not So Super Notes | 2jts615dr1E | 23:56 | 54M |
| DEF CON 20 - Matthew Toussain and Christopher Shields - Subterfuge | tIPq41_lqJU | 39:00 | 117M |
| DEF CON 20 - Michael Coppola - Owning the Network: Adventures in Router Rootkits | sWdqSG9IydA | 50:09 | 172M |
| DEF CON 20 - Michael Perklin - Anti-Forensics and Anti-Anti-Forensics | BCnjKEFOH1M | 49:11 | 111M |
| DEF CON 20 - Michael Robinson and Chris Taylor - Spy vs Spy: Spying on Mobile Device Spyware | nTFY-URUHMw | 50:10 | 132M |
| DEF CON 20 - Mickey Shkatov and Toby Kohlenberg - We Have You by the Gadgets | fTtrLFubDc8 | 41:31 | 104M |
| DEF CON 20 - Nadeem Douba - Sploitego - Maltego's (Local) Partner in Crime | Lyz7-3D6Yak | 27:31 | 118M |
| DEF CON 20 - Nick Galbreath - New Techniques in SQLi Obfuscation | L19EKHtW8TY | 20:56 | 61M |
| DEF CON 20 - Panel - DEF CON Comedy Jam V, V for Vendetta | 7Ny_uaSZhiE | 01:50:11 | 266M |
| DEF CON 20 - Panel - Meet the EFF | xYiMLKtn_u4 | 50:20 | 106M |
| DEF CON 20 - Panel - The Making of DEF CON 20 | TnOoTFSvn3U | 51:04 | 175M |
| DEF CON 20 - Panel: Corman - World War 3.0: Chaos, Control & the Battle | IiCc3hoOiF8 | 49:26 | 132M |
| DEF CON 20 - Panel: DT Jericho and Russ Rogers - DC RECOGNIZE Awards | W7eWImSZoqM | 44:54 | 110M |
| DEF CON 20 - Paul Vixie and Andrew Fried - The DCWG Debriefing | E9n2dQ7Fv6A | 45:47 | 143M |
| DEF CON 20 - Paul Wilson - The Art of the Con | 3NexHkzVBy4 | 49:54 | 90M |
| DEF CON 20 - Peter Hannay - Exchanging Demands | Eznuimhycvk | 43:15 | 116M |
| DEF CON 20 - Phil Polstra - Bypassing Endpoint Security for $20 or Less | bEckoZ3KpTY | 43:53 | 254M |
| DEF CON 20 - Priest - QA with the Men (and Women) in Black | M2as4OmL4Q0 | 53:47 | 165M |
| DEF CON 20 - Raphael Mudge - Cortana: Rise of the Automated Red Team | 7asByNBhC1U | 47:43 | 180M |
| DEF CON 20 - Rebecca "bx" Shapiro and Sergey Bratus - Programming Weird Machines with ELF Metadata | V5KsUm1KfZE | 46:15 | 158M |
| DEF CON 20 - RenderMan - Hacker + Airplanes = No Good Can Come Of This | mY2uiLfXmaI | 50:56 | 169M |
| DEF CON 20 - Richard Thieme - Twenty Years Back Twenty Years Ahead | NSVn8gHaD94 | 49:36 | 205M |
| DEF CON 20 - Robert Deaton - DivaShark - Monitor your Flow | 6q_7vWGe3RA | 23:51 | 69M |
| DEF CON 20 - Robert Portvliet and Brad Antoniewicz - The Safety Dance | siYIRxcTfVc | 49:59 | 354M |
| DEF CON 20 - Ryan Holeman - Passive Bluetooth Monitoring in Scapy | P4akUvCB0S0 | 25:00 | 71M |
| DEF CON 20 - Ryan Reynolds and Jonathan Claudius - Stamp Out Hash Corruption! Crack All The Things! | ILJT93H5Usc | 41:07 | 149M |
| DEF CON 20 - Sandy Clark and Matt Blaze - SIGINT and Traffic Analysis for the Rest of Us | 2NEY48V99go | 47:40 | 109M |
| DEF CON 20 - Sergio 'flacman' Valderrama and Carlos Alberto Rodriguez - Scylla | QRmQ7xnXAB4 | 15:48 | 47M |
| DEF CON 20 - Shawn Henry - Changing the Security Paradigm | cHJfX4aS3IU | 46:50 | 195M |
| DEF CON 20 - Svetlana Gaivoronski and Dennis Gamayunov - Demorpheus | wOD8_YJKG8s | 14:20 | 53M |
| DEF CON 20 - Thomas Cannon - Into the Droid: Gaining Access to Android User Data | MOYqgIhQ3y0 | 45:14 | 102M |
| DEF CON 20 - Thor - Socialized Data Using Social Media as a Cyber Mule | Ue7T2p4VvBw | 36:34 | 87M |
| DEF CON 20 - Tim Maletic and Christopher Pogue - OPFOR 4Ever | TbKhFW4xK50 | 47:30 | 215M |
| DEF CON 20 - Tom Perrine - Creating an A1 Security Kernel in the 1980s | fjJjppHPcdA | 49:45 | 62M |
| DEF CON 20 - Viss - Drinking From the Caffeine Firehose We Know as Shodan | -T-3buBwMEQ | 24:32 | 103M |
| DEF CON 20 - Wesley McGrew - SCADA HMI and Microsoft Bob | iV4Mt0DLLDw | 43:51 | 147M |
| DEF CON 20 - Xeno Kovah and Corey Kallenberg - No More Hooks | ODZ44NqJeWs | 48:14 | 95M |
| DEF CON 20 - Zack Fasel - Owned in 60 Seconds: From Network Guest to Windows Domain Admin | n3i07GnOLO8 | 35:50 | 85M |
| DEF CON 20 Documentary 20min Preview - 720p | JWo4EATAUzA | 19:28 | 260M |
| DEF CON 20 Documentary Bonus Clips - A Toast | M91Pqt0ysVo | 00:57 | 1M |
| DEF CON 20 Documentary Bonus Clips - A Top Qualitty Production | I4CKiELC8-I | 02:09 | 4M |
| DEF CON 20 Documentary Bonus Clips - Alexis Park Home Improvement | AlawNjasyqA | 01:15 | 2M |
| DEF CON 20 Documentary Bonus Clips - Another Vegas Story | sP8YA0XOpR8 | 00:55 | 22K |
| DEF CON 20 Documentary Bonus Clips - Barkode and Bloodkode | PjKsnk_imdo | 02:39 | 7M |
| DEF CON 20 Documentary Bonus Clips - Bed Jumping Mafia | _QG6IYmpxCU | 02:14 | 5M |
| DEF CON 20 Documentary Bonus Clips - Being a Party Host | E2vP2ruA_VE | 02:27 | 6M |
| DEF CON 20 Documentary Bonus Clips - CDC muxed | C9WjzBThpUg | 07:53 | 243K |
| DEF CON 20 Documentary Bonus Clips - Creme Brulee | OapHByMR9N8 | 01:36 | 7M |
| DEF CON 20 Documentary Bonus Clips - Mongolian Beef | mHPtkxLcfak | 02:37 | 7M |
| DEF CON 20 Documentary Bonus Clips - Not the Same Anymore | Cfi5cAefVX4 | 03:45 | 10M |
| DEF CON 20 Documentary Bonus Clips - Peggy and Her Three Hackers | uzBI-k8PYxA | 02:09 | 51K |
| DEF CON 20 Documentary Bonus Clips - Porn Santa | QobMwWfs-jU | 03:19 | 18M |
| DEF CON 20 Documentary Bonus Clips - Richard Thieme | ayWmp0vwBwo | 02:42 | 5M |
| DEF CON 20 Documentary Bonus Clips - Service Hallways on Segway | Q1ewWPg7rRI | 02:58 | 10M |
| DEF CON 20 Documentary Bonus Clips - The Layover | mimVbJ45Uag | 00:48 | 1M |
| DEF CON 20 Documentary Bonus Clips - The Organization | VOxIKM1cZoo | 02:10 | 5M |
| DEF CON 20 Documentary Bonus Clips - VeraNG | 9pWy6ANg88A | 02:16 | 8M |
| DEF CON 20 Documentary Bonus Clips - We Make No Money From You | L5qwIdVJ8Qk | 01:25 | 3M |
| DEF CON 2020 NYE MISS JACKALOPE DJ Music Video | XKyqli9qFM8 | 49:51 | 1G |
| DEF CON 2020 NYE Skittish & Bus DJ Music Video | Ut6d6SaS3e4 | 45:59 | 1G |
| DEF CON 2020 NYE Yesterday & Tomorrow DJ Music Video | V9kae0iTr6E | 50:37 | 1G |
| DEF CON 2020 NYE - Hacker Jeopardy | GXdnAvDDPJ8 | 00:19 | 7M |
| DEF CON 2020 NYE - Hacker Jeopardy Tiebreaker - Church of Wifi vs Show&TELNET | gOruB8NXGvs | 01:16:12 | 374M |
| DEF CON 21 - Melissa Elliott - Noise Floor Exploring Unintentional Radio Emissions | 5N1C3WB8c0o | 42:58 | 332M |
| DEF CON 21 - ZOZ - Hacking Driverless Vehicles | k5E28fp4oc0 | 49:08 | 295M |
| DEF CON 22 - Paul Such 0x222 and Agix - Playing with Car Firmware or How to Brick your Car | tVLatTmNI38 | 18:51 | 116M |
| DEF CON 22 - Alexandre Moneger - Generating ROP payloads from numbers | l_14h0r7qA8 | 42:24 | 268M |
| DEF CON 22 - Andrew Hunt - Raspberry MoCA - A recipe for compromise | nSqV78le3jU | 22:19 | 138M |
| DEF CON 22 - Anton Sapozhnikov - Acquire current user hashes without admin privileges | bji0VMXl108 | 26:59 | 243M |
| DEF CON 22 - Blake Self and Shawn "cisc0ninja" Burrell - Don't DDoS Me Bro: Practical DDoS Defense | vbdyG0l_b3M | 40:00 | 292M |
| DEF CON 22 - Brady Bloxham - Getting Windows to Play with Itself | dq2Hv7J9fvk | 38:02 | 88M |
| DEF CON 22 - Brent White - Corporate Espionage | D2N6FclMMTg | 36:59 | 266M |
| DEF CON 22 - Brian Gorenc and Matt Molinyawe - Building Your Own SMS⧸MMS Fuzzer | zn6D-iVcRwg | 22:30 | 121M |
| DEF CON 22 - Cesar Cerrudo - Hacking US (and UK, Australia, France, etc.) traffic control systems | _j9lELCSZQw | 47:37 | 330M |
| DEF CON 22 - Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack Surfaces | tnYO4U0h_wY | 50:24 | 359M |
| DEF CON 22 - Chris Hadnagy - What Your Body Tells Me - Body Language for the SE | RfLj7y0Xf2Y | 58:15 | 471M |
| DEF CON 22 - Chris Littlebury - Home Alone with localhost: Automating Home Defense | 2IeU7Cck0hI | 46:09 | 200M |
| DEF CON 22 - Christopher Campbell - The $env:PATH less Traveled | -SqAlpANtIs | 18:28 | 75M |
| DEF CON 22 - Christopher Campbell - The Secret Life of Krbtgt | 7HdcEQGQZDU | 17:05 | 137M |
| DEF CON 22 - Christopher Soghoian - Blinding The Surveillance State | pM8e0Dbzopk | 41:32 | 308M |
| DEF CON 22 - Dameff, Tully, and Hefley - Hacking 911: Adventures in Disruption, Destruction & Death | mBOLml3yLBY | 45:20 | 293M |
| DEF CON 22 - Dr. Paul Vixie - Domain Name Problems and Solutions | 5D4wssff0jg | 42:44 | 251M |
| DEF CON 22 - Graham, Mcmillan, and Tentler - Mass Scanning the Internet: Tips, Tricks, Results | nX9JXI4l3-E | 48:47 | 412M |
| DEF CON 22 - Kallenberg and Kovah - Extreme Privilege Escalation On Windows 8⧸UEFI Systems [d6VCri6s | Y].f136.mp4 | 00:00 | 114M |
| DEF CON 22 - Panel - PropLANE: Kind of keeping the NSA from watching you pee | H7kPoJXtE6Y | 48:57 | 313M |
| DEF CON 22 - Panel - Summary of Attacks Against BIOS and Secure Boot | QDSlWa9xQuA | 45:39 | 329M |
| DEF CON 22 - Phil Zimmermann - How To Get Phone Companies To Just Say No To Wiretapping | HuHm1vzzm1g | 51:03 | 162M |
| DEF CON 22 - Philip “Soldier of Fortran” Young - From root to SPECIAL: Pwning IBM Mainframes | Xfl4spvM5DI | 21:50 | 161M |
| DEF CON 22 - Pierce and Loki - NSA Playset : GSM Sniffing | wzyuioto4y8 | 46:34 | 284M |
| DEF CON 22 - Richard Klafter (Free) and Eric Swanson (Lachesis) - Check Your Fingerprints | 3LZhFFm1tK0 | 16:42 | 47M |
| DEF CON 22 - Robert Rowley - Detecting and Defending Against a Surveillance State | d5jqV06Yijw | 43:07 | 82M |
| DEF CON 22 - Ryan Kazanciyan and Matt Hastings, Investigating PowerShell Attacks | qF06PFcezLs | 37:14 | 286M |
| DEF CON 22 - Ryan Lackey & Marc Rogers & theGrugq - Masquerade | _KyfJW2lHtk | 42:15 | 301M |
| DEF CON 22 - Ryan Noah Shapiro - Hacking the FBI - How & Why to Liberate Government Records | H2eTlyd7r54 | 50:43 | 93M |
| DEF CON 22 - Scott Erven and Shawn Merdinger - Just What The Doctor Ordered? | wTEMSBXtkAc | 01:28:04 | 611M |
| DEF CON 22 - Shahar Tal - I Hunt TR-069 Admins: Pwning ISPs Like a Boss | rz0SNEFZ8h0 | 32:01 | 286M |
| DEF CON 22 - Shane Macaulay - Weird-Machine Motivated Practical Page Table Shellcode | tfFbQvglaxU | 42:02 | 334M |
| DEF CON 22 - Svetlana Gaivoronski and Ivan Petrov - Shellcodes for ARM | vOz40Zk8lEw | 38:09 | 297M |
| DEF CON 22 - Tess Schrodinger - From Raxacoricofallapatorius With Love | CxkJyibPfEo | 47:50 | 351M |
| DEF CON 22 - Tim Strazzere and Jon Sawyer - Android Hacker Protection Level 0 | vLU92bNeIdI | 47:46 | 100M |
| DEF CON 22 - Wesley McGrew- Instrumenting Point-of-Sale Malware | IFNb3ciJZkQ | 46:15 | 299M |
| DEF CON 22 - Weston Hecker - Burner Phone DDOS 2 dollars a day : 70 Calls a Minute | EDci2gb3ruQ | 41:40 | 120M |
| DEF CON 22 - Will Schroeder - Veil-Pillage: Post-exploitation 2. | KYYIluNXgMw | 41:11 | 199M |
| DEF CON 22 - Zoltán Balázs - Bypass firewalls, application white lists... | ssE_mwSEH9U | 42:17 | 307M |
| DEF CON 23 - Panel - DEF CON Comedy Inception | XA1h8L5S9I4 | 01:39:25 | 203M |
| DEF CON 23 - Teddy Reed and Nick Anderson - Hardware and Trust Security ELI5 | 2gbooa3tO5o | 45:22 | 302M |
| DEF CON 23 - Balmas and Oppenheim - How To Turn Your KVM Into a Raging Key Logging Monster | 5OHfwgosq08 | 43:15 | 108M |
| DEF CON 23 - Bart Kulach - Hack the Legacy: IBM I aka AS400 Revealed | JsqUZ3xGdLc | 45:44 | 255M |
| DEF CON 23 - Christian Frichot - Hooked: Browser Meshed Networks with WebRTC and BeEF | BrmCOdRHq8I | 46:06 | 259M |
| DEF CON 23 - El Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths | jnBhb6DiP2k | 21:26 | 136M |
| DEF CON 23 - Jean Philippe Aumasson - Quantum Computers vs Computers Security | kIWcpSzW4xY | 32:16 | 197M |
| DEF CON 23 - Michael Schrenk - Applied Intelligence: Using Information Thats Not There | UJeKNl461d8 | 38:30 | 288M |
| DEF CON 23 - Peter Shipley - Insteon: False Security and Deceptive Documentation | dy1LTQLmPtM | 35:32 | 260M |
| DEF CON 23 - Rich Kelley - Harness: Powershell Weaponization Made Easy | sgi73boZ9Xk | 20:37 | 111M |
| DEF CON 23 - 1057 - RICK ASTLEY | gzjMrSknbEI | 46:30 | 288M |
| DEF CON 23 - Aaron Grattafiori - Linux Containers: Future or Fantasy? - 101 Track | iN6QbszB1R8 | 44:40 | 299M |
| DEF CON 23 - Aditya K Sood - Dissecting the Design of SCADA Web HMIs: Hunting Vulns | jX5cz4jI3yk | 36:44 | 241M |
| DEF CON 23 - Alejandro Mayorkas - Working together to keep the Internet safe and secure | u6dHxhPXcNM | 46:29 | 463M |
| DEF CON 23 - Amit Ashbel & Maty Siman - Game of Hacks: Play, Hack & Track - 101 Track | 6wiBl3lohu4 | 31:29 | 99M |
| DEF CON 23 - AmmonRa - How to Hack Your Way out of Home Detention | z8VkZCCWqgg | 36:46 | 188M |
| DEF CON 23 - Atlas - Fun with Symboliks | 9HL6MljOX0o | 42:20 | 265M |
| DEF CON 23 - Beccaro and Collura - Extracting the Painful Blue Tooth | UAFddrsqnQY | 43:02 | 215M |
| DEF CON 23 - BioHacking Village - Alejandro Hernández - Brain Waves Surfing - (In)security in EEG | c7FMVb_5SBM | 50:18 | 333M |
| DEF CON 23 - BioHacking Village - Alex Smith - Cloning Access Cards to Implants | jSzUwF9RfJw | 18:52 | 102M |
| DEF CON 23 - BioHacking Village - Johan Sosa - Genetic engineering - GMO for fun and profit | X9b_2jlILTg | 49:31 | 234M |
| DEF CON 23 - BioHacking Village - Keoni Gandall - Biohacking at Home | NuYM10pweMs | 23:41 | 131M |
| DEF CON 23 - BioHacking Village - Michael Goetzman - Social Implications of DNA Acquisition | RYMedhgjswU | 23:36 | 149M |
| DEF CON 23 - BioHacking Village - Panel - The Anatomy of DIY Implantable Devices | VUSzRg4KWe8 | 30:23 | 162M |
| DEF CON 23 - BioHacking Village - Walter Powell - Parallels in BioSec and InfoSec | -WaR8xakXKg | 17:31 | 100M |
| DEF CON 23 - BioHacking Village - Whitlock and Aganovic - Physiology from the Perspective of Control | Is1f5KxtNCQ | 53:01 | 289M |
| DEF CON 23 - Brent White - Hacking Web Apps | I8AhfDEKUQ4 | 38:19 | 254M |
| DEF CON 23 - Bruce Potter - A Hacker's Guide to Risk | aa4g2VSqlxM | 53:29 | 441M |
| DEF CON 23 - Bruce Schneier - Questions and Answers | bjopJ-_vAUE | 46:34 | 591M |
| DEF CON 23 - Charlie Miller & Chris Valasek - Remote Exploitation of an Unaltered Passenger Vehicle | OobLb1McxnI | 46:21 | 326M |
| DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering | HlUe0TUHOIc | 38:48 | 213M |
| DEF CON 23 - Chris Rock - I Will Kill You | 9FdHq3WfJgs | 31:28 | 74M |
| DEF CON 23 - Chris Sistrunk - NSM 101 for ICS - 101 Track | H6AWRziR028 | 38:47 | 145M |
| DEF CON 23 - Colby Moore - Spread Spectrum Satcom Hacking | 2aBXpho5b7w | 40:27 | 195M |
| DEF CON 23 - Colin Flynn - Dont Whisper my Chips: Sidechannel and Glitching for Fun and Profit | BHqrA8lzz2o | 42:56 | 145M |
| DEF CON 23 - Cory Doctorow - Fighting Back in the War on General Purpose Computers | pT6itfUUsoQ | 50:56 | 489M |
| DEF CON 23 - Craig Young - How to Train Your RFID Hacking Tools | kVMAgiJlQkI | 30:17 | 158M |
| DEF CON 23 - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research | Mnylr3nH7kY | 45:32 | 143M |
| DEF CON 23 - Crypto and Privacy Village - Carlson and Doherty - Breaking CBC | v0IsYNDMV7A | 52:31 | 285M |
| DEF CON 23 - Crypto and Privacy Village - Craig Young - Smart Home Invasion | VWEhaZdUVW8 | 22:09 | 126M |
| DEF CON 23 - Crypto and Privacy Village - Freddy Martinez - IMSI Catchers | JyTb5mJOYLo | 31:20 | 145M |
| DEF CON 23 - Crypto and Privacy Village - Marina - Hacking Quantum Cryptography | 1Fp6ibfOQ4Y | 46:17 | 331M |
| DEF CON 23 - Crypto and Privacy Village - Nick Sullivan - CFSSL the evolution of a PKI toolkit | U7WGLJSesw0 | 21:48 | 136M |
| DEF CON 23 - Crypto and Privacy Village - Robert Olson - Teaching Privacy Using Red Team Strategies | EGm1ux3H6jY | 01:00:14 | 360M |
| DEF CON 23 - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village | F9kKo190_oE | 40:36 | 250M |
| DEF CON 23 - Damon Small - Beyond the Scan The Value Proposition of Vuln Assessment | d6IRn7v_r6Y | 45:46 | 130M |
| DEF CON 23 - Dan Petro and Oscar Salaza - Hacking Smart Safes: On the Brink of a Robbery | aCOzE1_dDBY | 45:58 | 218M |
| DEF CON 23 - Daniel Crowley and Damon Smith - Bugged Files: Is Your Doc Telling on You? | M3vP-wughPo | 46:14 | 194M |
| DEF CON 23 - Daniel Selifonov - Drinking from LETHE: Exploiting Memory Corruption Vulns | vE4WAHLKw_8 | 43:08 | 221M |
| DEF CON 23 - David An - When the Secretary of State says Please Stop Hacking Us | XF_5t547Qfg | 20:30 | 109M |
| DEF CON 23 - David Huerta - Alice and Bob are Really Confused | pkh7gUm82QY | 43:40 | 286M |
| DEF CON 23 - David Mortman - Docker, Docker Give Me The News: I Got A Bad Case Of Securing You | 7ouzigqFUWU | 43:22 | 315M |
| DEF CON 23 - Dennis Maldonado - Are We Really Safe? - Bypassing Access Control Systems | -cZ7eDV2n5Y | 46:17 | 428M |
| DEF CON 23 - Di Federico and Shoshitaishvili - Dark Side of the ELF | aGoDYa7Kbec | 46:21 | 182M |
| DEF CON 23 - Dr Phil Polstra - Hacker in the Wires | b0IB6z9fry8 | 38:58 | 249M |
| DEF CON 23 - Dr Phil Polstra - One Device to Pwn Them All | F9cYW7oPNw4 | 34:33 | 97M |
| DEF CON 23 - DT and 1057 - Welcome to DEF CON | QrhlY29Pu4c | 40:27 | 223M |
| DEF CON 23 - Eijah - Crypto for Hackers | lTngMxmymX4 | 55:51 | 407M |
| DEF CON 23 - Eric XlogicX Davisson - REvisiting RE DoS | Hbih2lG2v0s | 43:58 | 128M |
| DEF CON 23 - Etienne Martineau - The art of cache timing covert channel on x86 multi core | 7X772EBdvnM | 38:00 | 307M |
| DEF CON 23 - Fernando Arnabold - Abusing XSLT for Practical Attacks | FCtcza-pP8U | 34:31 | 147M |
| DEF CON 23 - Francis Brown, Shubham Shah - RFIDiggity: Guide to Hacking HF NFC & UHF RFID | YcHjUJmeK4o | 54:05 | 411M |
| DEF CON 23 - Geoff Walton and Dave Kennedy - Pivoting Without Rights: Introducing Pivoter | uHuzC45O9sw | 49:33 | 321M |
| DEF CON 23 - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack | m6W9LlMvNfI | 40:28 | 272M |
| DEF CON 23 - Graham and Maynor - HamSammich – Long Distance Proxying Over Radio | TcuSb5AknhI | 27:20 | 182M |
| DEF CON 23 - Grant Bugher - Obtaining and Detecting Domain Persistence | gajEuuC2-Dk | 46:26 | 294M |
| DEF CON 23 - Gregory Picket - Staying Persistent in Software Defined Networks | zHDAg8UVTLc | 45:04 | 162M |
| DEF CON 23 - Hardware Hacking Village - Dr. Tran - Introduction to Lockpicking | rkrSauOgSdc | 14:31 | 97M |
| DEF CON 23 - Hardware Hacking Village - Machinist - Mechanical Engineering for Noobs | 0Dj9TFztZxA | 45:26 | 130M |
| DEF CON 23 - Hardware Hacking Village - Matt DuHarte - Introduction to USB and Fuzzing | KWOTXypBt4E | 44:37 | 176M |
| DEF CON 23 - Hardware Hacking Village - Nikhil Mittal - Hacking with Human Interface Devices | _ZyU8Mlibdw | 45:30 | 159M |
| DEF CON 23 - Hardware Hacking Village - Soldering 101 - Melting metal for fun and profit | u6qVTMNY9Fo | 12:14 | 74M |
| DEF CON 23 - Ian Kline - LTE Recon and Tracking with RTLSDR | ti8_NozsT_I | 13:39 | 90M |
| DEF CON 23 - Ian Latter - Remote Access the APT | lfiBu8-RCdc | 39:58 | 233M |
| DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers | YcC3p3HYxA0 | 41:56 | 77M |
| DEF CON 23 - IoT Village - Aaron Guzman - Security - the IoT World | VOvzsnIQPyA | 43:40 | 248M |
| DEF CON 23 - IoT Village - Brian Knopf - Yes You Can Walk on Water | aTirAI-B-dI | 44:47 | 257M |
| DEF CON 23 - IoT Village - Daniel Miessler - IoT Attack Surface Mapping | RhxHHD790nw | 28:21 | 172M |
| DEF CON 23 - IoT Village - K Reid Wrightman - Vulnerability Inheritance in PLCs | -7tdfFRLBuY | 38:55 | 189M |
| DEF CON 23 - IoT Village - Kenneth Shaw - The Grid - A Multiplayer Game of Destruction | 2QFaPLoN65Y | 37:40 | 120M |
| DEF CON 23 - IoT Village - Wesley Wineberg - Cameras Thermostats and Home Automation Controllers | majPZcqlVjI | 59:52 | 397M |
| DEF CON 23 - Jason Haddix - How to Shot Web: Web and mobile hacking in 2015 | -FAjxUOKbdI | 48:23 | 228M |
| DEF CON 23 - Jeremy Dorrough - USB Attack to Decrypt Wi Fi Communications | UWOxzfRUwis | 38:50 | 266M |
| DEF CON 23 - Joe FitzPatrick and Matt King - NSA Playset: JTAG Implants | oGuZNmBZbjk | 44:58 | 318M |
| DEF CON 23 - John Seymour - Quantum Classification of Malware | w8VNY9k8i6o | 29:45 | 118M |
| DEF CON 23 - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks | hkw9tFnJk8k | 49:37 | 220M |
| DEF CON 23 - Joshua J Drake - Stagefright: Scary Code in the Heart of Android | Lxo4zhKe5hA | 47:32 | 293M |
| DEF CON 23 - Joshua Smith - High Def Fuzzing: Exploring Vulnerabilities in HDMI CEC * | zWoyC6wDDfU | 47:52 | 269M |
| DEF CON 23 - Justin Engler - Secure Messaging for Normal People | S_YRo0iPjYc | 50:10 | 422M |
| DEF CON 23 - Ken Westin - Confessions of a Professional Cyber Stalker | Tyel1gfSjl4 | 40:44 | 276M |
| DEF CON 23 - Krotofil, Larsen - Rocking the Pocket Book: Hacking Chem Plants | AL8L76n0Q9w | 50:07 | 443M |
| DEF CON 23 - Lin Huang and Qing Yang - Low cost GPS simulator: GPS spoofing by SDR | jwJKMti_aw0 | 36:54 | 250M |
| DEF CON 23 - Lock Picking Village - Chris Pentacoff - Intro to Lockpicking | IQDZCcdw4Z4 | 13:50 | 65M |
| DEF CON 23 - Lock Picking Village - Jos Weyers - Key Impressioning | qLIYb8PMZbg | 33:44 | 231M |
| DEF CON 23 - Lock Picking Village - Preston Thomas - Intro to Lockpicking 1 | fU7-r83Nx3Y | 26:36 | 132M |
| DEF CON 23 - Luke Young - Investigating the Practicality and Cost of Abusing Memory Errors | 4b5disac9g4 | 41:44 | 137M |
| DEF CON 23 - Mahdi Namazifar - Detecting Randomly Generated Strings | 70q5ojxNuv4 | 20:44 | 93M |
| DEF CON 23 - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S | KX_0c9R4Fng | 49:48 | 138M |
| DEF CON 23 - Mark Ryan Talabis - The Bieber Project: Adventures in Buying Internet Traffic | dES9uttXcCY | 43:17 | 127M |
| DEF CON 23 - Marquis-Boire, Marschalek, Guarnieril - F the attribution, show us your .idb | Vwn9QIp4abU | 54:43 | 415M |
| DEF CON 23 - Marte Loge - Tell me who you are and I will tell you your lock pattern | 6Z5NtzFA7Z8 | 17:57 | 94M |
| DEF CON 23 - Matt Cagle and Eric Cheng - Who Will Rule the Sky: The Coming Drone Policy | zlPKy3bZUkE | 48:07 | 325M |
| DEF CON 23 - McNeil and Owen - Sorry Wrong Number: Mysteries Of The Phone System | UlZQSRWF5Q0 | 48:23 | 397M |
| DEF CON 23 - McSweeny and Soltani - How to Hack Gov: Technologists as Policy Makers | yj18lz1dwEc | 50:44 | 279M |
| DEF CON 23 - miaubiz - Put on Your Tinfo_t Hat if You're My Type | pH6oKCAxg5A | 16:46 | 86M |
| DEF CON 23 - Michael Walker and Jordan Wiens - Machine vs Machine: DARPAs Fully Automated CTF | ejPghbtAG58 | 45:30 | 300M |
| DEF CON 23 - Mickey Shkatov & Jesse Michael - Scared Poopless – LTE and your laptop | q4pRYZjzL_E | 44:26 | 284M |
| DEF CON 23 - Mike Ryan and Richo Healey - Hacking Electric Skateboards | JZ3EB68v_B0 | 44:51 | 196M |
| DEF CON 23 - Mike Sconzo - I Am Packer And So Can You Video | jCIT7rXX8y0 | 46:01 | 341M |
| DEF CON 23 - Mike Walker and Jordan Wiens - Machine vs. Machine: Inside DARPA’s Fully Automated CTF | gnyCbU7jGYA | 45:08 | 382M |
| DEF CON 23 - Nadeem Douba - BurpKit: Using WebKit to Own the Web | csMN9sEiDUI | 29:26 | 185M |
| DEF CON 23 - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP Stack | Uz6G_YAQb2U | 38:46 | 284M |
| DEF CON 23 - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min: Securing IAAS | KxLESIJeMmk | 47:06 | 207M |
| DEF CON 23 - Omer Coskun - Why Nation-State malwares target Telco Networks | Dx5DNcMStyc | 47:18 | 161M |
| DEF CON 23 - Packet Capture Village - Bob Simpson - MITM 101 - Easy Traffic Interception Techniques | bImHBLFrrdc | 33:36 | 260M |
| DEF CON 23 - Packet Capture Village - Brian Wohlwinder and Andrew Beard - I See You | 0eRkQOlFn50 | 32:00 | 147M |
| DEF CON 23 - Packet Capture Village - David Schwartzberg - Hacking the Next Generation [HC1 | hmVdA4].f13 | 00:00 | 205M |
| DEF CON 23 - Packet Capture Village - David Schwartzberg - Hacking the Next Generation [HC1ychmVd | ].f251.webm | N/A | 12M |
| DEF CON 23 - Packet Capture Village - Elliot Brink - Global Honeypot Trends | rjd-r4WA0PU | 37:24 | 278M |
| DEF CON 23 - Packet Capture Village - Grecs - Creating REAL Threat Intelligence With Evernote | ZUp6uOkHIcI | 52:16 | 348M |
| DEF CON 23 - Packet Capture Village - Jay Beale - Jailing Programs via Docker | _yd2rzd9494 | 58:36 | 388M |
| DEF CON 23 - Packet Capture Village - Joseph Muniz & Aamir Lakhani - Pen Testing with Raspberry Pi | SvQi6bkm-5A | 26:44 | 230M |
| DEF CON 23 - Packet Capture Village - Karl Koscher - Sniffing SCADA | 4vPptUmyv4U | 29:40 | 235M |
| DEF CON 23 - Packet Capture Village - Leon Ward - The Packets Made Me Do It - Using OpenFPC | r_qViQBX7jE | 46:55 | 309M |
| DEF CON 23 - Packet Capture Village - Lokesh Pidawekar - Hackers Practice Ground | W7gSE7msPiU | 40:57 | 307M |
| DEF CON 23 - Packet Capture Village - Michael Raggo - Mobile Data Loss - Threats and Countermeasures | nnRo-sCnLas | 35:30 | 268M |
| DEF CON 23 - Packet Capture Village - Mike Raggo - Remaining Covert in an Overt World | kBBhlhLqBjQ | 31:50 | 272M |
| DEF CON 23 - Packet Capture Village - Ming Chow - Tools and Techniques Used at the Wall of Sheep | 63zB7nCnqU0 | 17:54 | 76M |
| DEF CON 23 - Packet Capture Village - Monzy Merza - Real World Automation for Rapid Response | yAzULqBllXc | 17:14 | 136M |
| DEF CON 23 - Packet Capture Village - Nikhil Mittal - Powershell for Penetraton Testers | PezFo2Y1BUA | 50:58 | 300M |
| DEF CON 23 - Packet Capture Village - Paul Vixie - Passive DNS Collection and Analysis | yb_KxMA2w2I | 44:52 | 255M |
| DEF CON 23 - Packet Capture Village - Robert Simmons - The Digital Cockroach Bait Station | 4e-ENa1ygC0 | 37:51 | 272M |
| DEF CON 23 - Packet Capture Village - Ron Taylor - Violating Web Services | ab3gjFkUa1A | 36:48 | 291M |
| DEF CON 23 - Packet Capture Village - Sam Bowne - Is Your Android App Secure | JJr6hxcOB1Y | 47:12 | 269M |
| DEF CON 23 - Packet Capture Village - Theodora Titonis - How Machine Learning Finds Malware | 2cQRSPFSY-s | 44:49 | 317M |
| DEF CON 23 - Packet Capture Village - Tony Martin - From XSS to Root on Your NAS | sh9ROo4OKsk | 28:44 | 65M |
| DEF CON 23 - Packet Capture Village - Vivek Ramachandran - 80211 Monitoring with PCAP2XML - SQLite | 4yHko5upDSQ | 47:15 | 311M |
| DEF CON 23 - Packet Capture Village - Wayne Crowder - Fishing To Phishing | lPsK_1Bi4dM | 43:53 | 407M |
| DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs | JUt9PiMyRsA | 36:57 | 88M |
| DEF CON 23 - Panel - Ask the EFF: The Year in Digital Civil Liberties | UfdGrkDp3TA | 01:39:08 | 1G |
| DEF CON 23 - Panel - Closing Ceremonies | 02v0qalqsSU | 01:26:44 | 330M |
| DEF CON 23 - Panel - Contests Closing Ceremonies | 2P7r5g4SkuY | 27:25 | 171M |
| DEF CON 23 - Panel - DEF CON 101: The Panel | 8gRJs8jcyWc | 01:21:27 | 183M |
| DEF CON 23 - Panel - Lets Encrypt Minting Free Certs to Encrypt the Entire Web | Ya6t8nMclos | 52:35 | 356M |
| DEF CON 23 - Panel - Licensed to Pwn: Weaponization and Regulation of Security Research | 9TdJOM5p--w | 01:45:56 | 411M |
| DEF CON 23 - Panel - Switches Get Stitches | yaY3rtA37Uc | 43:42 | 336M |
| DEF CON 23 - Panel - ThunderStrike 2: Sith Strike | LNvYeUxwmTw | 44:46 | 177M |
| DEF CON 23 - Panel - WhyMI so Sexy: WMI Attacks - Real Time Defense and Advanced Forensics | xBd6p-Lz3kE | 01:45:26 | 474M |
| DEF CON 23 - Patrick Wardle - DLL Hijacking on OS X | PGVNja2MNws | 45:10 | 205M |
| DEF CON 23 - Patrick Wardle - Stick That In Your root Pipe and Smoke It | pbpaUuGLS5g | 40:53 | 199M |
| DEF CON 23 - Priest - Impromptu Spot the Fed | 7GODPk-MzKE | 14:29 | 122M |
| DEF CON 23 - Qing Yang - Im A Newbie Yet I Can Hack ZigBee | xgNT05l6Jlw | 21:37 | 171M |
| DEF CON 23 - Richard Thieme - Hacking the Human Body and Brain | KDPLV4S6hgQ | 51:23 | 182M |
| DEF CON 23 - Ricky Lawshae - Let's Talk About SOAP Baby, Let's Talk About UPNP | dT0b5DWq9b8 | 43:29 | 237M |
| DEF CON 23 - Rob Bathurst and Jeff Thomas - Canary: Keeping Your Dick Pics Safer | D7Vkxa3Ujzk | 48:14 | 155M |
| DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline | 5CzURm7OpAA | 47:34 | 150M |
| DEF CON 23 - Ronny Bull and Jeanna Matthews -Exploring Layer 2 Security in Virtualized Environments | RaA5dEIqzzQ | 47:17 | 259M |
| DEF CON 23 - Runa Sandvik, Michael Auger - Hacking a Linux-Powered Rifle | PEpuEprQ5VU | 40:48 | 243M |
| DEF CON 23 - Ryan Castellucci - Cracking CryptoCurrency Brainwallets | foil0hzl4Pg | 42:49 | 284M |
| DEF CON 23 - Ryan Mitchell - Separating Bots from the Humans | PADKIdSPOsc | 24:25 | 181M |
| DEF CON 23 - Ryan Oneill - Advances in Linux Process Forensics Using ECFS | fCJJnJ84MSE | 46:34 | 192M |
| DEF CON 23 - Samy Kamkar - Drive it like you Hacked it: New Attacks and Tools to Wireles | UNgvShN4USU | 45:31 | 255M |
| DEF CON 23 - Sarah Edwards - Ubiquity Forensics: Your iCloud and You | M_nlPopsHMo | 44:33 | 213M |
| DEF CON 23 - Scott Erven and Mark Collao -Medical Devices: Pwnage and Honeypots | ZusL2BY6_XU | 44:14 | 200M |
| DEF CON 23 - Sean Metcalfe - Red vs Blue: Modern Active Directory Attacks & Defense | rknpKIxT7NM | 50:24 | 357M |
| DEF CON 23 - Sean Pierce - Abusing Native Shims for Post Exploitation | LOsesi3QkXY | 47:42 | 381M |
| DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking: The next gen of binary analysis | oznsT-ptAbk | 45:57 | 294M |
| DEF CON 23 - Social Engineering Village - Adam Compton & Eric Gershman - SpeedPhishing Framework | w-Rk8WnnFaE | 40:13 | 252M |
| DEF CON 23 - Social Engineering Village - Chris Hadnagy - A Peek Behind the Blue Mask | O5lXUSMGQ2I | 55:29 | 312M |
| DEF CON 23 - Social Engineering Village - Dave Kennedy - Understanding End-User Attacks | UJdxrhERDyM | 51:17 | 235M |
| DEF CON 23 - Social Engineering Village - Ian Harris - Understanding Social Engineering Attacks | H3gfMkvw76o | 51:45 | 277M |
| DEF CON 23 - Social Engineering Village - Jayson E. Street - Breaking in Bad | 2vdvINDmlX8 | 52:38 | 171M |
| DEF CON 23 - Social Engineering Village - John Ridpath - Shakespeare and Social Engineering | jFNJqW9-8_0 | 33:11 | 122M |
| DEF CON 23 - Social Engineering Village - Michele Fincher - I Didn’t Think it was Loaded | mZw_ewKKccU | 37:07 | 182M |
| DEF CON 23 - Social Engineering Village - Noah Beddome - Yellow Means Proceed with Caution | tOSyKhv4TfA | 55:37 | 239M |
| DEF CON 23 - Social Engineering Village - Tim Newberry - Twitter ISIL and Tech | JU-Qn-hiKX0 | 52:57 | 263M |
| DEF CON 23 - Tamas Szakaly - Shall We Play a Game | XxyRDkmNMHg | 40:52 | 296M |
| DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK: Android App Exploit and SCA Tool | mQ522hFmNt8 | 47:07 | 358M |
| DEF CON 23 - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control F | gatYe_oriJw | 39:18 | 257M |
| DEF CON 23 - Tottenkoph and IrishMASMS - Hackers Hiring Hackers | BtjbvWCICI8 | 52:16 | 231M |
| DEF CON 23 - Van Albert and Banks - Looping Surveillance Cameras through Live Editing | RoOqznZUClI | 41:25 | 341M |
| DEF CON 23 - Vehicle Hacking Village - Eric Evenchick - SocketCAN | Ym8xFGO0llY | 27:47 | 76M |
| DEF CON 23 - Vehicle Hacking Village - Josh Corman - Safer Sooner Automotive Cyber Safety | IO-MrkyHPpI | 52:04 | 181M |
| DEF CON 23 - Vehicle Hacking Village - Nathan Hoch - The Badge and PAWN: Customizing the Badge | nK4nufSjR3g | 45:44 | 250M |
| DEF CON 23 - Vivek Rakmachandran - Chellam: A Wi Fi IDS Firewall for Windows | MIArq4d-V8A | 34:02 | 140M |
| DEF CON 23 - Vivek Rakmachandran - Chigula: Framework for Wi Fi IDS and Forensics | dKrzkr2qUPo | 44:27 | 280M |
| DEF CON 23 - Wesley McGrew - I Hunt Penetration Testers: More Weaknesses in Tools and Procedures | pSGAu4PZ7bw | 41:39 | 155M |
| DEF CON 23 - Weston Hecker - Goodbye Memory Scraping Malware | H4cpZlnANGk | 37:46 | 280M |
| DEF CON 23 - Wireless Village - Balint Seeber - SIGINT & Blind Signal Analysis w⧸ GNU Radio & SDR | drsgh_PZmJ8 | 01:54:24 | 780M |
| DEF CON 23 - Wireless Village - Catatonic - Tospo Virus: Weaponizing WiFi Pineapple Vulnerabilities | 5kiYszJ3ogo | 01:22:49 | 232M |
| DEF CON 23 - Wireless Village - Cyb3r Assassin - Wireless Pentesting: So Easy a Cave Man Can Do It | kMq7uzWY_jI | 01:15:30 | 331M |
| DEF CON 23 - Wireless Village - JoshInGeneral - Meeting People Over WiFi | 9SIMe0yMy78 | 35:22 | 89M |
| DEF CON 23 - Wireless Village - Karl Koscher - DSP for SDR | y3O-t2UfL0o | 37:59 | 241M |
| DEF CON 23 - Wireless Village - Kitchen and Kinne - Sniffin WiFi Sippin Pineapple Juice | vsOuOlKbjH4 | 53:20 | 326M |
| DEF CON 23 - Wireless Village - Michael Calabro - Software Defined Radio Performance Trades & Tweaks | 0WzM4K35jIU | 46:10 | 123M |
| DEF CON 23 - Wireless Village - Tim Oshea - GNU Radio Tools for Radio Wrangling⧸Spectrum Domination | CrHNlu8TbJg | 50:35 | 126M |
| DEF CON 23 - Wireless Village - Travis Goodspeed, Sergey Bratus - PSK31 Modulation Polyglots | NoS5dD2kDDs | 56:42 | 324M |
| DEF CON 23 - Wireless Village - V. Ramachandran - Automatic Live WPA WPA2 Attacks and WPA Supplicant | cd75pICSyFM | 51:58 | 278M |
| DEF CON 23 - Wireless Village - Vivek Ramachandran and Thomas Dotreppe - WPA Enterprise Hacking | TOxch8ZBi2I | 01:22:34 | 406M |
| DEF CON 23 - Wireless Village - Wireless Warrior - Covert Wireless Practical Hacker LPI LPD | wfX-XCgs9iQ | 01:03:44 | 245M |
| DEF CON 23 - Young and Rikansrud - Security Necromancy : Further Adventures in Mainframe Hacking | LgmqiugpVyU | 48:30 | 356M |
| DEF CON 23 - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware | XGAGfXSbOh0 | 44:16 | 280M |
| DEF CON 23 - Zack Allen and Rusty Bower - Malware in the Gaming Micro Economy | njLmXeS9GFM | 42:19 | 220M |
| DEF CON 23 - Zack Fasel - Seeing through the Fog | zaSn0wrtwQE | 34:39 | 232M |
| DEF CON 23 - Zheng and Shan - Build a free cell traffic capture tool with vxworks | 1DJQPMRdZ_I | 42:31 | 172M |
| DEF CON 23 - Zoz - And That's How I Lost My Other Eye...Explorations in Data Destruction (Fixed) | -bpX8YvNg6Y | 53:09 | 313M |
| DEF CON 23 -John Menerick - Backdooring Git | lXf9nlTmnK4 | 40:10 | 283M |
| DEF CON 23 Conference - Andres Blanco, Andres Gazzoli - 80211 Massive Monitoring | uUCv9TQ9B7I | 37:43 | 177M |
| DEF CON 23 Trailer - Declassified! | rNdLm1O5uoY | 01:13 | 27M |
| DEF CON 24 - Przemek Jaroszewski - Hacking boarding passes for fun and profit | qnq0UfOUTlM | 45:21 | 263M |
| DEF CON 24 - Adam Donenfeld - Stumping the Mobile Chipset | vAo76EjL_m4 | 40:46 | 223M |
| DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS | fSt3pNzr79E | 44:56 | 241M |
| DEF CON 24 - Allan Cecil - Robot Hacks: TASBot Exploits Consoles with Custom Controllers | 9ZrNWiBzqUE | 41:57 | 145M |
| DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine | QvxNo9j70DU | 48:24 | 235M |
| DEF CON 24 - Anch - So you think you want to be a penetration tester | Kaat-T71N3A | 41:58 | 396M |
| DEF CON 24 - Andy Robbins. Rohan Vazarkar, Will Schroeder - Six Degrees of Domain Admin | wP8ZCczC1OU | 44:35 | 237M |
| DEF CON 24 - Ang Cui - A Monitor Darkly: Reversing and Exploiting Ubiquitous OSD Controllers | zvP2FEfOSsk | 34:09 | 166M |
| DEF CON 24 - Anthony Rose, Ben Ramsey - Picking Bluetooth Low Energy Locks a Quarter Mille Away | KrOReHwjCKI | 42:22 | 109M |
| DEF CON 24 - ashmastaflash - SITCH:Inexpensive Coordinated GSM Anomaly Detection | YDALL62Nz0k | 40:59 | 252M |
| DEF CON 24 - Benjamin Holland - Developing Managed Code Rootkits for JRE | zomaLPN2KNY | 42:55 | 140M |
| DEF CON 24 - Bertin Bervis Bonilla, James Jara - Exploiting seismological networks Rem | vizcnvCkRsg | 43:45 | 145M |
| DEF CON 24 - bigezy and saci - An introduction to Pinworm : MITM for your metadata | M0Rg_x5Nf94 | 32:40 | 203M |
| DEF CON 24 - Brad Dixon - pin2pwn: How to Root an Embedded Linux Box with a Sewing Needl | KRNTv3oXDkE | 15:01 | 42M |
| DEF CON 24 - Brad Woodberg - Malware Command and Control Channels: A journey into darkness | v7XcyCjUTWk | 48:34 | 199M |
| DEF CON 24 - Bryant Zadegan, Ryan Lester - Abusing Web Standards for AppSec Glory | 9xE0200CPjU | 45:21 | 105M |
| DEF CON 24 - Chris Eagle, Sk3wlDbg - Emulating many of the things with Ida | 6wypIgRi3cw | 51:36 | 256M |
| DEF CON 24 - CINCVolFLT, AK3R303 - NG911: The Next Gen of Emergency Ph0nage | 2JztRvdIY1w | 45:12 | 234M |
| DEF CON 24 - Clarence Chio - Machine Duping 101: Pwning Deep Learning Systems | JAGDpJFFM2A | 44:12 | 188M |
| DEF CON 24 - Dan AltF4 Petro Reversing Video Games to Create an Unbeatable AI Player | 05v1-DJjma8 | 46:40 | 329M |
| DEF CON 24 - DC101 - DEF CON 101 Panel | UGVi3ZX5IqM | 01:32:24 | 723M |
| DEF CON 24 - Delta Zero, KingPhish3r - Weaponizing Data Science for Social Engineering | l7U0pDcsKLg | 44:42 | 190M |
| DEF CON 24 - Dr Paul Vixie - Frontrunning The Frontrunners | C1E1UlC9bFM | 17:52 | 51M |
| DEF CON 24 - Dr Phil - Mouse Jiggler: Offense and Defense | 5Nk6iDryW0Y | 45:18 | 217M |
| DEF CON 24 - Elie Bursztein, Celine Bursztein, - Cheating at Poker | bU6bosBN5D0 | 28:13 | 69M |
| DEF CON 24 - Evan Booth - Jittery MacGyver: Building a Bionic Hand out of a Coffee | tZwjgc7X-2E | 46:00 | 351M |
| DEF CON 24 - Fred Bret Mounet - All Your Solar Panels are belong to Me | OB5lAtLG4WU | 22:23 | 126M |
| DEF CON 24 - goldfisk, follower - Breaking the Internet of Vibrating Things | v1d0Xa2njVg | 20:05 | 83M |
| DEF CON 24 - Grant Bugher - Bypassing Captive Portals and Limited Networks | GhUUzGBjhXQ | 16:16 | 46M |
| DEF CON 24 - Guevara Noubir, Amirali Sanatinia - Exposing Snooping Tor HSDir Relays | cJWsJ47joAQ | 24:14 | 97M |
| DEF CON 24 - Haoqi Shan, Wanqiao Zhang - Forcing a Targeted LTE phone into Unsafe Netw | Nn8Pwz9MxSA | 31:00 | 127M |
| DEF CON 24 - Hendrik Schmidt, Brian Butterly - Attacking BaseStations | m_y7OosNTRc | 42:24 | 196M |
| DEF CON 24 - Hunter Scott - RT to Win: 50 lines of Python made me the luckiest guy on Twitter | iAOOdYsK7MM | 17:17 | 70M |
| DEF CON 24 - int0x80 - Anti Forensics AF | _fZfDGWpP4U | 37:24 | 146M |
| DEF CON 24 - Jake Kambic - Cunning with CNG: Soliciting Secrets from Schannel | KGmJMHyHJjE | 41:16 | 95M |
| DEF CON 24 - Jake Kouns - Cyber Who Done It: Attribution Analysis Through Arrest History | 3rlWr1dF_Lk | 42:39 | 104M |
| DEF CON 24 - James Loureiro. Georgi Geshev - Platform Agnostic Kernel Fuzzing | M8ThCIfVXow | 44:16 | 99M |
| DEF CON 24 - Javier Vazquez Vidal, Ferdinand Noelscher - CAN i haz car secret plz | gx35otoHQgw | 22:36 | 103M |
| DEF CON 24 - Jay Beale and Larry Pesce - Phishing without Failure and Frustration | r4yqeuWlJqM | 46:15 | 336M |
| DEF CON 24 - Jay Healey - Feds and 0Days: From Before Heartbleed to After FBI Apple [bK6D8VF0 | Q].f136.mp4 | 00:00 | 94M |
| DEF CON 24 - Jay Healey - Feds and 0Days: From Before Heartbleed to After FBI Apple [bK6D8V | KjQ].f251-9 | N/A | 33M |
| DEF CON 24 - Jennifer Granick - Slouching Towards Utopia - The State of the Internet Dream | GWXQGMcx9cs | 51:50 | 237M |
| DEF CON 24 - Jianhao Liu, Chen Yan, Wenyuan Xu - Can You Trust Autonomous Vehicles? | orWqKWvIW_0 | 44:04 | 351M |
| DEF CON 24 - Jmaxxz - Backdooring the Frontdoor | MMB1CkZi6t4 | 38:37 | 136M |
| DEF CON 24 - Joe FitzPatrick, Joe Grand - 101 Ways to Brick your Hardware | acNu_JFJe50 | 45:42 | 120M |
| DEF CON 24 - Joe Grand and Zoz - BSODomizer HD: A mischievous FPGA HDMI platform | EshjrNOs2ps | 45:49 | 211M |
| DEF CON 24 - Jonathan Brossard - Intro to Wichcraft Compiler Collection | 1cgtr7VW7gY | 43:21 | 250M |
| DEF CON 24 - Jonathan Christofer Demay - Auditing 6LoWPAN Networks using Standard Tools | sDcB2uSbxw0 | 29:56 | 157M |
| DEF CON 24 - Jonathan Christofer Demay, Arnaud Lebrun - CANSPY: Auditing CAN Devices | vTsdxNGS_xc | 17:39 | 168M |
| DEF CON 24 - Joshua Drake, Steve Christey Coley - Vulnerabilities 101 | UYgBLUhHrCw | 43:17 | 249M |
| DEF CON 24 - JusticeBeaver - Discovering and Triangulating Rogue Cell Towers | bbDAa0syz5A | 32:07 | 97M |
| DEF CON 24 - K2 - BlockFighting with a Hooker: BlockfFghter2! | WL0bM590_AA | 38:40 | 144M |
| DEF CON 24 - Kai Zhong - 411: A framework for managing security alerts | LQyqhrDl7f8 | 41:23 | 129M |
| DEF CON 24 - Karyn Benson - Examining the Internet's pollution | wjva6ZJyhwE | 37:58 | 94M |
| DEF CON 24 - Ladar Levison - Compelled Decryption: State of the Art in Doctrinal Perversity | JQiDGH2OW6k | 34:44 | 127M |
| DEF CON 24 - Linuz, Medic - Sticky Keys To The Kingdom: Pre auth RCE | EAYtRQKfna0 | 22:25 | 83M |
| DEF CON 24 - LosT - Hacker Fundamentals and Cutting Through Abstraction | kSuq3Ry9PLQ | 38:37 | 172M |
| DEF CON 24 - Lucas Lundgren, Neal Hindocha - Light Weight Protocol: Critical Implications | o7qDVZr0t2c | 45:14 | 170M |
| DEF CON 24 - Luke Young - Attacking Network Infrastructure to Generate a 4 Tbs DDoS | Fi-nI-Faj4I | 36:18 | 121M |
| DEF CON 24 - Marc Newlin - MouseJack: Injecting Keystrokes into Wireless Mice | 00A36VABIA4 | 42:34 | 123M |
| DEF CON 24 - MasterChen - Weaponize Your Feature Codes | 5RrvZicVoZw | 42:09 | 217M |
| DEF CON 24 - Matteo Beccaro and Matteo Collura - Abusing Smart Cities | ii_nCvLVJpg | 38:25 | 174M |
| DEF CON 24 - Max Bazaliy - A Journey Through Exploit Mitigation Techniques in iOS | Gu4UJR9nZqM | 20:11 | 65M |
| DEF CON 24 - Mickey Shkatov, Panel How to Make Your Own DEF CON Black Badge | mMFWznJwguE | 47:14 | 198M |
| DEF CON 24 - Mike Walker, Arati Prabhakar - DARPA Cyber Grand Challenge Award Ceremony | O-ASHNgSO-I | 26:07 | 259M |
| DEF CON 24 - Mudge Zatko and Sarah Zatko - Project CITL | GhO9vyW1f7w | 45:11 | 158M |
| DEF CON 24 - Nate Cardozo - Crypto State of the Law | YN_qVqgRlx4 | 44:34 | 198M |
| DEF CON 24 - Panel - Ask the EFF [abaCzYrw | 4].f136.mp4 | 00:00 | 104M |
| DEF CON 24 - Panel - Ask the EFF [abaC | rwrO4].f251 | N/A | 17M |
| DEF CON 24 - Panel - Closing Ceremonies | bfuRKriDDYQ | 01:20:02 | 345M |
| DEF CON 24 - Panel - MR ROBOT Panel | _bBrj6QBPW0 | 01:20:41 | 737M |
| DEF CON 24 - Patrick Wardle - Ive got 99 Problems, but LittleSnitch aint one | sRcHt-sxcPI | 20:01 | 63M |
| DEF CON 24 - Plore - Side channel attacks on high security electronic safe locks | lXFpCV646E0 | 19:59 | 87M |
| DEF CON 24 - regilero - Hiding Wookiees in HTTP: HTTP smuggling | dVU9i5PsMPY | 35:40 | 147M |
| DEF CON 24 - Richard Thieme - Playing Through Pain: The Impact of Secrets and Dark Knowledge | yGrcHhfUZDk | 49:42 | 490M |
| DEF CON 24 - Ricky 'HeadlessZeke' Lawshae - Network Attacks Against Physical Security Systems | p_J2pR1CxJo | 25:57 | 116M |
| DEF CON 24 - RISE OF THE MACHINES | A9ew4jdLjYY | 01:43 | 15M |
| DEF CON 24 - Ronny Bull, Dr Matthews, Kaitlin Trumbull - Attacks in Virtualized Environments | tdG7gYb2P4o | 45:01 | 165M |
| DEF CON 24 - Shane Steiger Are You Playing with a Full Deck | hZVcOxUxVEQ | 41:29 | 221M |
| DEF CON 24 - Shellphish - Panel: Cyber Grand Shellphish | tEtlFUEWrEY | 50:55 | 357M |
| DEF CON 24 - Six Volts and Haystack - Cheap Tools for Hacking Heavy Trucks | PDlkcKtkeOE | 21:23 | 49M |
| DEF CON 24 - Stephan Huber and Siegfried Rasthofer - Smartphone Antivirus and Apps | _aLhKmIT-Fo | 35:43 | 140M |
| DEF CON 24 - Tamas Szakaly - Help! Ive got ANTs | 0CHAgcnkxg4 | 39:22 | 105M |
| DEF CON 24 - Terrell McSweeny and Lorrie Cranor - Research on the Machines: Help the FTC | WjhyiSktrxY | 43:45 | 310M |
| DEF CON 24 - The Bob Ross Fan Club - Propaganda: You and your devices | Kep8r-5AtTc | 40:18 | 207M |
| DEF CON 24 - Tim Estell and Katea Murray - NPRE: Eavesdropping on the Machines | 4al5xfdI_xs | 35:09 | 150M |
| DEF CON 24 - Tom Kopchak - Sentient Storage: Do SSDs Have a Mind of Their Own | C5JoC4-qsO0 | 44:17 | 162M |
| DEF CON 24 - Ulf Frisk - Direct Memory Attack the Kernel | fXthwl6ShOg | 43:19 | 182M |
| DEF CON 24 - Weston Hecker - Hacking Hotel Keys and Point of Sale Systems | mV_0k9Fh590 | 44:19 | 261M |
| DEF CON 24 - Weston Hecker - Hacking Hotel Keys and POS systems | _Q3HuQnRtbU | 44:19 | 261M |
| DEF CON 24 - Weston Hecker - Hacking Next Gen ATMs From Capture to Cashout | FgIk_oIK2SM | 30:05 | 95M |
| DEF CON 24 - Willa Cassandra Riggins, abyssknight - Esoteric Exfiltration | jB99bBYK_AE | 18:48 | 109M |
| DEF CON 24 - Yonathan Klijnsma and Dan Tentler - Stargate: Pivoting Through VNC | ImO3QSFxLak | 19:56 | 68M |
| DEF CON 24 - Zack Fasel, Erin Jacobs - Attacks Against Top Consumer Products | XkJ2tH21Wf8 | 43:19 | 91M |
| DEF CON 24 - Zero Chaos and Granolocks - Realtime bluetooth device detection Blue Hydra | TgXh22RlrZo | 31:21 | 168M |
| DEF CON 24 Car Hacking Village - Ben Breckt - Vehicle to Infrastructure V2X | senXEtIxUjk | 37:52 | 376M |
| DEF CON 24 Car Hacking Village - Jun Li - Deep Learning on CAN BUS | 1QSo5sOfXtI | 01:00:12 | 155M |
| DEF CON 24 Car Hacking Village - Jun Li, Yuan Jian - Security Flaws in Automotive Immobilizer | p3SJp-7LSNs | 01:05:01 | 392M |
| DEF CON 24 Car Hacking Village - Ken Munro - The Mitsubishi Hack Explained | aeWlfvJ5pEo | 24:06 | 249M |
| DEF CON 24 Car Hacking Village - Nathan Hoch - Hacking the CHV Badge | 4hiyrqlFanU | 11:23 | 48M |
| DEF CON 24 Car Hacking Village - Nathan Hoch - Understanding Heavy Truck Event Data | oAlFnYYmOGQ | 27:36 | 174M |
| DEF CON 24 Car Hacking Village - Trevor Roest - Using Yard Stick One for FOB Fun | A91UZCP4f-U | 13:04 | 80M |
| DEF CON 24 Conference Rogan Dawes and Dominic White Universal Serial aBUSe | HTrQHZtNyBw | 44:56 | 240M |
| DEF CON 24 Conference Zack Fasel and Erin Jacobs I Fight For The Users Episode I | w2A9x1pVXGk | 43:19 | 189M |
| DEF CON 24 Conference - Aaron Luo - Drones Hijacking: Multidimensional attack vectors and countermea | R6RZ5KqSVcg | 45:39 | 229M |
| DEF CON 24 Conference - Jonathan Mayer, Panel - Meet the Feds | EPIVjqExh9s | 43:36 | 191M |
| DEF CON 24 Crypto and Privacy Village - Alisha Kloc - Logs Aren't Enough | 2vB3H5kumVc | 43:52 | 179M |
| DEF CON 24 Crypto and Privacy Village - Andrew Brandt - Blue Coat SSL Visibility Exposed | w90mcTU2P90 | 01:02:55 | 387M |
| DEF CON 24 Crypto and Privacy Village - David Wong - How to Backdoor Diffie-Hellman | 90EYVy35gsY | 38:24 | 187M |
| DEF CON 24 Crypto and Privacy Village - Greg Norcie - My Usability Goes to 11 A Hackers Guide to Use | SyitnCnCIFE | 34:27 | 220M |
| DEF CON 24 Crypto and Privacy Village - Mat Caughron, Trey Blalock - Revocation the Frailty of PKI | 2GtoAycltxM | 44:20 | 345M |
| DEF CON 24 Crypto and Privacy Village - Panel - Catching a Cheat | TY1aWIdaWj4 | 54:27 | 316M |
| DEF CON 24 Internet of Things Village Damien Cauquil Btlejuice The Bluetooth Smart Mitm Framewor [lcn07Tcl | 0].f136.mp4 | 00:00 | 327M |
| DEF CON 24 Internet of Things Village Damien Cauquil Btlejuice The Bluetooth Smart Mitm Framewor [lcn0 | clnS0].f251 | N/A | 58M |
| DEF CON 24 Internet of Things Village - Elvis Collado - Reversing and Exploiting Embedded Devices | r4XntiyXMnA | 47:21 | 299M |
| DEF CON 24 Internet of Things Village - Jeff Kitson - Tranewreck | 67LwoFsSdiA | 52:04 | 284M |
| DEF CON 24 Internet of Things Village - Panel - FTC. | M9u_8OUMtSU | 42:28 | 329M |
| DEF CON 24 SE Village - Chris Hadnagy - 7 Jedi Mind Tricks: Influence Your Target without a Word | VFnCRVWBISY | 51:26 | 368M |
| DEF CON 24 SE Village - Cyni Winegard, Bethany Ward - Human Hacking: You ARE the Weak Link | fHDxu2sgGMQ | 51:44 | 366M |
| DEF CON 24 SE Village - David Kennedy -The Wizard of Oz - Painting a Reality Through Deception | 4uN44YfsQPk | 51:17 | 186M |
| DEF CON 24 SE Village - Fadli Sidek - Advanced SE Techniques and The Rise of cyber scams | zYw8tDLJOxg | 50:53 | 196M |
| DEF CON 24 SE Village - James Powell - You Are Being Manipulated | hL-6uRfoGvU | 35:08 | 211M |
| DEF CON 24 SE Village - Jayson Street - Total Fail: and Bad Mistakes, I've Made a Few | l1OFH_H8PjQ | 51:19 | 421M |
| DEF CON 24 SE Village - Mattias Borg - SCAM CALL : Call Dropped [1zT | s4Q6IY].f13 | 00:00 | 33M |
| DEF CON 24 SE Village - Mattias Borg - SCAM CALL : Call Dropped [1zTsfs4Q6IY | f251-8.webm | N/A | 6M |
| DEF CON 24 SE Village - Panel - The Live SE Podcast 84 | CzoDDE6S3p0 | 59:43 | 378M |
| DEF CON 24 SE Village - Robert Anderson - US Interrogation Techniques and SE | G_lmXqBUtZc | 52:24 | 316M |
| DEF CON 24 SE Village - Steven Zani - How to Un Work Your Job | 7BmBiWbQO2o | 29:42 | 160M |
| DEF CON 24 SE Village - Tomohisa Ishikawa - Cultural Differences in SE | qoTUYQd3RvU | 50:04 | 291M |
| DEF CON 24 Wireless Village - Kat Sweet - I Amateur Radio And So Can You | iP_s0fFrf8M | 40:05 | 169M |
| DEF CON 24 Wireless Village - Balint Seeber - SDR Tips and Tricks | yZ5G0nYSM98 | 01:46:08 | 518M |
| DEF CON 24 Wireless Village - Brian Butterly and Stefan Kiese - Introducing the HackMeRF | Ve4rmGOq6dM | 38:46 | 221M |
| DEF CON 24 Wireless Village - Caleb Mays and Ben Ramsey - Insteon Inste off Inste open | 0QmOb15a8xw | 18:50 | 39M |
| DEF CON 24 Wireless Village - Gabriel Ryan - Slaving Rogue Access Points w⧸ Python & Cheap Hardw | dtNUFGnToQs | 19:46 | 101M |
| DEF CON 24 Wireless Village - Iyer and Nandedkar - Covert Cupid Under 11 Veil Approach for Covert | 9wpcDMYJsuM | 28:40 | 63M |
| DEF CON 24 Wireless Village - Jose Gutierrez and Ben Ramsey - How Do I BLE Hacking | oP6sx2cObrY | 20:32 | 108M |
| DEF CON 24 Wireless Village - Matt Knight - Reversting LoRa Deconstructing a Next Gen Proprietary LP | KEjlkZA2olE | 49:26 | 211M |
| DEF CON 24 Wireless Village - Village People - Wireless Capture the Flag Inbrief | -z_HcOpPnog | 45:18 | 179M |
| DEF CON 24 Wireless Village - Village People - WCTF Day 2 Kickoff | AWpdetj0Zdk | 19:52 | 135M |
| DEF CON 25 - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine | g5Hx86H3-mc | 44:05 | 126M |
| DEF CON 25 - Gus Fritschie, Evan Teitelman - Backdooring the Lottery and Other Security Tales | 49KU9NDcCgI | 37:33 | 97M |
| DEF CON 25 - Trey Forgety - Inside the “Meet Desai” Attack Defending Distributed Targets | jAv-le5-NE0 | 39:20 | 153M |
| DEF CON 25 - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes | LUtluTaEAUU | 47:06 | 184M |
| DEF CON 25 - Dimitry Snezhkov - Abusing Webhooks for Command and Control | 6Sq0gNp_vQY | 21:36 | 58M |
| DEF CON 25 - Elie Bursztein - How We Created the First SHA 1 Collision | NbHL0SYlrSQ | 37:17 | 164M |
| DEF CON 25 - Gabriel Ryan - The Black Art of Wireless Post Exploitation | n5_xb9E4G_U | 45:36 | 116M |
| DEF CON 25 - Plore - Popping a Smart Gun | J3f0p3vTY-c | 42:00 | 169M |
| DEF CON 25 - XlogicX - Assembly Language is Too High Level | eunYrrcxXfw | 45:14 | 148M |
| DEF CON 25 - Andy Robbins, Will Schroeder - Designing Active Directory DACL Backdoors | _nGpZ1ydzS8 | 43:24 | 167M |
| DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation | VQGqseMDEIs | 40:32 | 349M |
| DEF CON 25 - Avi Bashan, Slava Makkaveev - Everything to know about Android packers | U1XeGYDFp9A | 32:02 | 80M |
| DEF CON 25 - Caleb Madrigal - Controlling IoT devices with crafted radio signals | qhuhJ9Oe9vA | 32:52 | 118M |
| DEF CON 25 - Chaosdata - Ghost in the Droid: Possessing Android Applications with ParaSpectre | ohjTWylMGEA | 18:27 | 43M |
| DEF CON 25 - Cheng - The spear to break the security wall of S7CommPlus | 93lyRgZYxKw | 15:37 | 62M |
| DEF CON 25 - Christopher Domas - Breaking the x86 Instruction Set | ajccZ7LdvoQ | 40:40 | 105M |
| DEF CON 25 - Cooper Quintin, Kashmir Hill - The Internet Already Knows I'm Pregnant | l0SdACyiLDA | 37:02 | 110M |
| DEF CON 25 - Damien Cauquil - Weaponizing the BBC Micro Bit | I9AqIaMjYcw | 34:23 | 131M |
| DEF CON 25 - Daniel Bohannon, Lee Holmes - Revoke Obfuscation: PowerShell Obfuscation | k5ToL0J7uL0 | 45:16 | 141M |
| DEF CON 25 - David Robinson - Using GPS Spoofing to control time | isiuTNh5P34 | 35:22 | 111M |
| DEF CON 25 - Dennis Maldonado - Real time RFID Cloning in the Field | kUduHIygbY8 | 20:33 | 56M |
| DEF CON 25 - Dor Azouri - BITSInject | UedRQgF06kI | 19:41 | 133M |
| DEF CON 25 - Duncan Woodbury, Nicholas Haltmeyer - Linux Stack Based V2X Framework | JQ9ldk5L96Y | 43:32 | 157M |
| DEF CON 25 - Francis Brown, David Latimer - Putting the Emerging Drone Defense Market to the Test | LXFnyDihdl0 | 42:36 | 109M |
| DEF CON 25 - Garry Kasparov - The Brain's Last Stand | fp7Pq7_tHsY | 48:07 | 232M |
| DEF CON 25 - Gerald Steere, Sean Metcalf - Hacking the Cloud | LufXEPTlPak | 43:03 | 278M |
| DEF CON 25 - Gil Cohen - Call the plumber: You have a leak in your named pipe | 6xt0lEj-sac | 37:07 | 146M |
| DEF CON 25 - Hanno Bõck - Abusing Certificate Transparency Logs | TMNeSnjZfCI | 30:22 | 80M |
| DEF CON 25 - Haoqi Shan, Jian Yuan - Man in the NFC | pXmmNe5uo-4 | 34:19 | 222M |
| DEF CON 25 - HighWiz, Malware Unicorn, Niki7a, Roamer, Wiseacre, Shaggy - DEF CON 101 Panel | 1MTLdC3S8ak | 01:50:50 | 368M |
| DEF CON 25 - Hyrum Anderson - Evading next gen AV using AI | FGCle6T0Jpc | 18:35 | 46M |
| DEF CON 25 - Ilja van Sprundel - Are all BSDs are created equally? A survey of BSD kerne | 1j1UaLsPv3k | 48:08 | 153M |
| DEF CON 25 - Inbar Raz, Eden Shochat - From One Country, One Floppy to Startup Nation | LJhhXH4QlRo | 47:03 | 220M |
| DEF CON 25 - Itzik Kotler, Amit Klein - The Adventures of AV and the Leaky Sandbox | YZKAPKNY09g | 40:30 | 238M |
| DEF CON 25 - James Langevin, Will Hurd - DC to DEF CON Q&A | 40frKOU3jHk | 46:34 | 285M |
| DEF CON 25 - Jason Haddix - Introducing HUNT Data Driven Web Hacking & Manual Testing | 0CU75vPfIS4 | 29:19 | 74M |
| DEF CON 25 - Jason Hernandez, Sam Richards, Jerod MacDonald-Evoy - Tracking Spies in the Skies | gFsPnIbzEco | 40:38 | 253M |
| DEF CON 25 - Jeff Moss and Panel - DEF CON Groups Panel | _d8I8cq1p_Q | 51:22 | 173M |
| DEF CON 25 - Jim Nitterauer - DNS: Devious Name Services Destroying Privacy & Anonymity w⧸o consent | gnUZddaPvUA | 40:25 | 135M |
| DEF CON 25 - Joe Rozner - Wiping out CSRF | 9h6bJpDeBnQ | 43:05 | 217M |
| DEF CON 25 - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome | HKQDSgBHPfY | 49:47 | 180M |
| DEF CON 25 - Josh Datko, Chris Quartier - Breaking Bitcoin Hardware Wallets | hAtoRrxFBWs | 18:52 | 50M |
| DEF CON 25 - JoSh Pitts - Teaching Old Shellcode New Tricks | jk1VAuPH4-w | 32:08 | 68M |
| DEF CON 25 - K2 - UnFucking Forensics: Active Passive memory hacking debugging | 1Dh889lemcI | 14:36 | 40M |
| DEF CON 25 - Konstantinos Karagiannis - Hacking Smart Contracts | WIEessi3ntk | 38:35 | 274M |
| DEF CON 25 - Lee Holmes - Get $pwnd: Attacking Battle Hardened Windows Server | ahxMOAAani8 | 22:15 | 69M |
| DEF CON 25 - Luke Young - There’s no place like 127.001: Achieving reliable DNS rebinding | Q0JG_eKLcws | 41:32 | 323M |
| DEF CON 25 - Marc Newlin, Logan Lamb, Chris Grayson - CableTap: Wirelessly Tapping Home Networks | LxfsT4wLAfU | 41:17 | 152M |
| DEF CON 25 - Marina Simakov, Igal Gofman - Gaining persistency by abusing advanced authe | JvormRcth9w | 39:42 | 179M |
| DEF CON 25 - Mark Williams, Rob Stanley - If You Give a Mouse a Microchip | gRWjd6o4LO4 | 29:19 | 199M |
| DEF CON 25 - Matt Joyce - Amateur Digital Archeology | ctwUkz_0gbg | 43:48 | 126M |
| DEF CON 25 - Matt Knight - Radio Exploitation 101 | HTVPmF8u7Yg | 32:39 | 247M |
| DEF CON 25 - Matt Suiche - Porosity A Decompiler For Blockchain Based Smart Contracts Bytecode | d7EcNyuJy2g | 36:22 | 159M |
| DEF CON 25 - Matt Wixey - See no evil, hear no evil: Hacking invisibly & silently with light & sound | gFTiD7EnVjU | 43:36 | 350M |
| DEF CON 25 - Max Bazaliy - Jailbreaking Apple Watch | eJpbi-Qz6Jc | 36:12 | 88M |
| DEF CON 25 - Mickey Shkatov, Jesse Michael, Oleksandr Bazhaniuk - Driving down the rabbit hole | 5QBOmr_ZyLo | 38:05 | 100M |
| DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999 | QmiXUPCe8-k | 19:37 | 130M |
| DEF CON 25 - Min Zheng, Xiangyu Liu - macOS:iOS Kernel Debugging and Heap Feng Shui | jqrw-VpYekY | 26:02 | 199M |
| DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level | Gu_5kkErQ6Y | 31:04 | 118M |
| DEF CON 25 - Nathan Seidle - Open Source Safe Cracking Robots | v9vIcfLrmiA | 27:25 | 145M |
| DEF CON 25 - Nathan Seidle -Open Source Safe Cracking Robots: Combinations Under 1 Hour | 7qNZ4PTCkS4 | 27:25 | 88M |
| DEF CON 25 - Nick Cano - XenoScan Scanning Memory Like a Boss | qGPQSyaA61s | 39:44 | 110M |
| DEF CON 25 - Octane - Untrustworthy Hardware and How to Fix It | 6dCdusRSFLw | 19:11 | 59M |
| DEF CON 25 - Patrick Wardle - Offensive Malware Analysis: Dissecting OSX FruitFly | q7VZtCUphgg | 20:27 | 54M |
| DEF CON 25 - Peyton Engel - Learning about Government Surveillance Software | 7Obeod8X7Do | 19:35 | 48M |
| DEF CON 25 - Philip Tully, Michael T Raggo - A Picture is Worth a Thousand Words, Literally | pJSyOq9xj3o | 46:09 | 109M |
| DEF CON 25 - Professor Plum - Digital Vengeance Exploiting the Most Notorious C&C Toolki | fPhkmAdWH-I | 33:37 | 85M |
| DEF CON 25 - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks | _Lc3O0nCfIw | 19:47 | 57M |
| DEF CON 25 - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming Back | atDgnkvzD8I | 45:24 | 224M |
| DEF CON 25 - Roger Dingledine - Next Generation Tor Onion Services | Di7qAVidy1Y | 43:07 | 289M |
| DEF CON 25 - Romain Coltel, Yves Le Provost - WSUSpendu: How to hang WSUS clients | ksHhtKvY49g | 17:41 | 109M |
| DEF CON 25 - Ryan Baxendale - Microservices and FaaS for Offensive Security | hVF9EEwIqR8 | 23:02 | 83M |
| DEF CON 25 - Saif El Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects | 2chDv_wTymc | 43:54 | 123M |
| DEF CON 25 - Salvador Mendoza - Exploiting 0ld Mag stripe information with New technology | pvYXMV9uuU4 | 15:39 | 124M |
| DEF CON 25 - Sarah Zatko - CITL and the Digital Standard: A Year Later | BufzX-zeZvQ | 37:33 | 180M |
| DEF CON 25 - Scott Behrens, Jeremy Heffner - Application DoS In Microservice Architectures | a29ILArKjGo | 40:25 | 104M |
| DEF CON 25 - Sean Dillon, Zach Harding - Koadic C: Windows COM Command & Control Framework | HJ_8VUgYzMw | 44:44 | 104M |
| DEF CON 25 - Snide Owen - Phone system testing and other fun tricks | jt6dpEqsda4 | 39:03 | 94M |
| DEF CON 25 - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build systems | mpUDqo7tIk8 | 41:00 | 99M |
| DEF CON 25 - Steinthor Bjarnason, Jason Jones - The call is coming from inside the house | qMQwENS30pg | 35:11 | 138M |
| DEF CON 25 - SupaFraud - Official DEF CON Teaser Video | FNtVqHaWFbU | 01:08 | 40M |
| DEF CON 25 - Svea Eckert, Andreas Dewes - Dark Data | 1nvYGi7-Lxo | 38:55 | 350M |
| DEF CON 25 - Tess Schrodinger - Total Recall Implanting Passwords in Cognitive Memory | UjsL7K2ga4A | 37:34 | 186M |
| DEF CON 25 - The Dark Tangent - Welcome to DEF CON 25 | ZCUlwHsT6QA | 14:46 | 106M |
| DEF CON 25 - Thomas Mathew, Dhia Mahjoub - Malicious CDNs | AbJCOVLQbjs | 45:54 | 122M |
| DEF CON 25 - Tomer Cohen - Game of Chromes: Owning the Web with Zombie Chrome Extensions | pR4HwDOFacY | 31:02 | 109M |
| DEF CON 25 - Vasilios Mavroudis, Dan Cvrcek - Trojan tolerant Hardware & Supply Chain Security | OOyhfylJXhM | 36:22 | 75M |
| DEF CON 25 - Vulc@n, Panel - The Last CTF Talk You’ll Ever Need: AMA with 20 years of CTF Organizers | MbIDrs-mB20 | 01:51:19 | 417M |
| DEF CON 25 - Weston Hecker - Opt Out or Deauth Trying! AntiTracking Bots & Keystroke Injection | IXciNThY764 | 36:29 | 205M |
| DEF CON 25 - Whitney Merrill, Terrell McSweeny - Tick, Tick, Tick Boom You're Dead: Tech & the FTC | 7E5hmStBocQ | 44:55 | 304M |
| DEF CON 25 - William Knowles - Persisting with Microsoft Office Abusing Extensibility Options | 6uovKSEPU2Q | 18:27 | 124M |
| DEF CON 25 - Yan Shoshitaishvili - 25 Years of Program Analysis | XL9kWQ3YpLo | 49:45 | 334M |
| DEF CON 25 - Yuwue Zheng, Lin Huang - Ghost Telephonist Impersonates You Through LTE CSF | nZI2W94vYLA | 42:07 | 114M |
| DEF CON 25 - Zenofex, 0x00string, CJ 000, Maximus64 - All Your Things Are Belong To Us | ClDO4PyMI-g | 59:43 | 162M |
| DEF CON 25 -The Dark Tangent, Def Con Goons - DEF CON Closing Ceremonies | Ly7uurZ2d9A | 01:23:28 | 359M |
| DEF CON 25 BioHacking Village - Jay Radcliffe - The Scientific Method in Security Research | UkA9JOUcFi4 | 50:16 | 160M |
| DEF CON 25 BioHacking Village - Tess Schrodinger - Total Recall: Implicit Learning As Crypto | lNs2TXUb33g | 24:52 | 106M |
| DEF CON 25 BioHacking Village - Stanislav Naydin, Vlad Gostomelsky - Medical Device Ethics | g3lvY5an4-E | 26:20 | 232M |
| DEF CON 25 BioHacking Village - Amanda Plimpton, Evan Anderson - Psychoactive Chemicals in Combat | lKBzOdsGonQ | 25:45 | 91M |
| DEF CON 25 BioHacking Village - Amirs Panel - Ethics in BioHacking | 5FMSedKwekE | 53:01 | 413M |
| DEF CON 25 BioHacking Village - C00p3r, Cur50r - Implantable Technology Show and Tell | VyJftVIjDNo | 19:38 | 77M |
| DEF CON 25 BioHacking Village - Christopher Frenz - Standardizing Deployment Of Medical Devices | ODiZc04CzgE | 21:52 | 68M |
| DEF CON 25 BioHacking Village - Edward You - Biotechnology Needs A Security Patch Badly | qDEJMc9JiJ0 | 25:22 | 203M |
| DEF CON 25 BioHacking Village - Gingerbread - Neurogenic Peptides Smart Drugs 4 Minute Mile | KPwjn17XQfs | 24:08 | 91M |
| DEF CON 25 BioHacking Village - Jeffrey Tibbetts - Biohackers Die | nn0kglB46BU | 25:02 | 59M |
| DEF CON 25 BioHacking Village - John Bass - Medical Industry Disrupt: Blockchain | vD4uSu_uwrw | 23:03 | 66M |
| DEF CON 25 BioHacking Village - Jun Axup - The Brave New World of Bio Entrepreneurship | 9pjOdhvIL1o | 19:39 | 100M |
| DEF CON 25 BioHacking Village - Kevin Sacco - Tales of A Healthcare Hacker | ij7uuY-3eXk | 28:53 | 81M |
| DEF CON 25 BioHacking Village - Louis Auguste Jr - Microscopes Are Stupid | 6VCj8MitA6M | 21:02 | 108M |
| DEF CON 25 BioHacking Village - Meow Ludo Meow Meow - DIYBioweapons and Regulation | VoqHJxf8hWQ | 23:32 | 182M |
| DEF CON 25 BioHacking Village - Paul Ashley - The Future is Fake Identities | 1Sft5aJ2Olo | 29:54 | 124M |
| DEF CON 25 BioHacking Village - RenderMan - Hacking The Internet of Dongs | eaLd9gcKTJQ | 25:36 | 73M |
| DEF CON 25 BioHacking Village - Robin Farmanfarmaian - The Patient as CEO | 4LKPRmEpfTc | 18:26 | 68M |
| DEF CON 25 BioHacking Village - Ryan Schmoll, Peter Hefley - Trigraph: Ethereum-based Teleradiology | M-WApMYWfFM | 21:22 | 104M |
| DEF CON 25 BioHacking Village - Szkatulski Lawless - How Your Doctor Might Be Trying To Kill You | KwT2j0vkf5E | 25:43 | 119M |
| DEF CON 25 BioHacking Village - Tim Cannon - The Moral Imperative of Biohacking | gfBdUzsz8cM | 18:22 | 73M |
| DEF CON 25 BioHacking Village - Travis Lawrence - Hacking the Second Genetic Code | HgsY1yvoRdQ | 18:24 | 90M |
| DEF CON 25 BioHacking Village - Trevor Goodman - Hack Your Senses: Sensory Augementation | mv-ensBMPIY | 25:03 | 73M |
| DEF CON 25 Car Hacking Village - Montalbano, Gillispie, Connett - Attacking Wireless Interfaces | knEV4u7yJdU | 34:23 | 139M |
| DEF CON 25 Car Hacking Village - Tim b1tbane, Mitch Johnson, ehntoo - That's No Car Its a Network | LmBixGkhEuI | 35:21 | 237M |
| DEF CON 25 Car Hacking Village - Weston Hecker - Grand Theft Radio Stopping SDR Relay Attacks | 0O3pwRHYYKg | 25:20 | 157M |
| DEF CON 25 Car Hacking Village - Badge Life: DEFCON Unofficial Badges Panel | -aJUUdKRy_k | 49:51 | 259M |
| DEF CON 25 Car Hacking Village - Corey Theun - Heavy Truck and Electronic Logging Devices | uIj7wkAoJ6Y | 31:57 | 116M |
| DEF CON 25 Car Hacking Village - Jeffrey Quesnelle - An Introduction to AUTOSAR Secure Onboard | X4szarzU3Rc | 43:45 | 152M |
| DEF CON 25 Car Hacking Village - Sameer Dixit, Vlad Gostomelsky - Abusing Smart Cars with QR Codes | EzSVIaykTs0 | 24:03 | 62M |
| DEF CON 25 Car Hacking Village - Sheila Ayelen Berta, Claudio Caracciolo - The Bicho | heKMPMahF2E | 32:06 | 97M |
| DEF CON 25 Car Hacking Village - Vlad Gostomelsky - GPS System Integrity | 9Wg4lzMasMo | 23:51 | 71M |
| DEF CON 25 Car Hacking Village - Woodbury, Haltmeyer - Linux Stack Based V2X Framework | FEpMtMLAxOU | 28:30 | 94M |
| DEF CON 25 Conference - Alvaro Muñoz, Alexandr Mirosh - Friday the 13th JSON attacks | ZBfBYoK_Wr0 | 37:59 | 103M |
| DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi | n_gSJkswdhU | 19:22 | 110M |
| DEF CON 25 Conference - Jason Staggs - Breaking Wind: Adventures Hacking Wind Farm Control Networks | DfNwWQAOdks | 23:03 | 103M |
| DEF CON 25 Conference - Josh Schwartz, John Cramb - MEATPISTOL, A Modular Malware Implant Framework | dbIdo9ilEIY | 36:46 | 220M |
| DEF CON 25 Crypto and Privacy Village - Alisha Kloc - Privacy is Not An Add On:Designing for Privacy | nVx7BMYypy8 | 32:00 | 185M |
| DEF CON 25 Crypto and Privacy Village - Andrew Brandt - SSL Visibility Revisted: A Year In Privacy I | CKfm414YsjU | 47:23 | 207M |
| DEF CON 25 Crypto and Privacy Village - David Huerta - Alice and Bob are Slightly Less Confused | eCEWUtrAsCw | 30:12 | 138M |
| DEF CON 25 Crypto and Privacy Village - David Wong - SHA 3 vs The World | BJnjAF2cz48 | 57:02 | 143M |
| DEF CON 25 Crypto and Privacy Village - Jake Williams -The Symantec SSL Debacle Lessons Learned | cepMMRPuzvU | 52:32 | 309M |
| DEF CON 25 Crypto and Privacy Village - Joel Wallenstrom, Robby Mook - A New Political Era | kLU1f34UmpU | 55:23 | 399M |
| DEF CON 25 Crypto and Privacy Village - Joseph Birr Pixton - Rustls Modern Fast Safer TLS | SsHLEuiyPI8 | 31:06 | 139M |
| DEF CON 25 Crypto and Privacy Village - Kenneth Geers - Traffic Analysis in Cyberspace | KwilB5FmGeo | 24:06 | 166M |
| DEF CON 25 Crypto and Privacy Village - Lauren Rucker - Have You Seen My Naked Selfies Neither Has M | OYxI43Zb-Fs | 42:26 | 458M |
| DEF CON 25 Crypto and Privacy Village - Lee Brotherston - Blue Team TLS Hugs | RT6VqSkQQtI | 25:39 | 82M |
| DEF CON 25 Crypto and Privacy Village - Mark Mager - Cryptanalysis in the Time of Ransomware | 0TF9NLsGCHA | 41:33 | 119M |
| DEF CON 25 Crypto and Privacy Village - Matt Cheung - Hacking on MultiParty Computation | AfWRDgOBMQU | 25:13 | 64M |
| DEF CON 25 Crypto and Privacy Village - Punky Duero - The Key Management Facility of The Root DNSSEC | 26j5lLymitM | 25:04 | 123M |
| DEF CON 25 Crypto and Privacy Village - Shea Nangle - Operational Security Lessons From The Dark Web | Gda4QVGHFOk | 28:08 | 49M |
| DEF CON 25 Crypto and Privacy Village - Tomas Susanka - Security Analysis of the Telegram IM | hvGyog57gwI | 20:33 | 106M |
| DEF CON 25 Crypto and Privacy Village - Trey Forgety - Protecting Users' Privacy | foeFGczCun8 | 50:06 | 322M |
| DEF CON 25 Crypto Village - J0n J4rv1s - Surveillance Capitalism Will Continue til Morale Improves | hn5VN72ZjDE | 01:06:32 | 129M |
| DEF CON 25 Crypto Village - Ryan Lackey - Cypherpunks History | l0q37IJi-CQ | 25:32 | 99M |
| DEF CON 25 ICS Village Blake Johnson Dissecting Industrial Wireless Implementations | I-TCfl0Jm2M | 31:47 | 71M |
| DEF CON 25 ICS Village - Thomas Brandsetter - InSecurity in Building Automation | G9ESeUWfYbs | 30:04 | 75M |
| DEF CON 25 ICS Village - Arnaud Soullié - Fun with Modbus 0x5a Nothing New Still Relevant? | A_B69Rifu1g | 24:10 | 54M |
| DEF CON 25 ICS Village - Bryson Bort, Atlas - Grid Insecurity and How to Really Fix This Shit | y0fHJiDWLPs | 31:30 | 94M |
| DEF CON 25 ICS Village - Chris Sistrunk - What's the DFIRence for ICS | BHL8HbgXoT8 | 30:15 | 105M |
| DEF CON 25 ICS Village - Joe Weiss - Cyber Security Issues with Level 0 through 1 Devices | UgvVaniZhsk | 36:46 | 85M |
| DEF CON 25 IoT Village - Aaron Alva, Mark Eichorn - IoT Updates to Help Protect Consumers | VeiVYob-ioM | 25:16 | 165M |
| DEF CON 25 IoT Village - Aaron Guzman - Hide Yo Keys, Hide Yo Car | SCCdlFHrj38 | 35:14 | 90M |
| DEF CON 25 IoT Village - Alex Jay Balan - IoT: The Gift That Keeps on Giving | UpxNkBvejf8 | 42:06 | 186M |
| DEF CON 25 IoT Village - Andrew Tierney, Ken Munro - IoT From DVRs to Dildos | jNqo3uAYsBk | 36:56 | 195M |
| DEF CON 25 IoT Village - Brian Knopf - Redesigning PKI For IoT Because Crypto is Hard | oeKm2qkarak | 45:11 | 242M |
| DEF CON 25 IoT Village - Dan Regalado - Inside the Alaris Infusion Pump, not too much medicine, plz | w4sChnS4DrI | 31:46 | 78M |
| DEF CON 25 IoT Village - Deral Heiland - The Internet of Vulnerabilities | uhYLfhXNlUc | 48:20 | 340M |
| DEF CON 25 IoT Village - Rick Ramgattie - Rethinking the Researcher-Vendor Relationshipe | IFHshxqGgXk | 24:17 | 79M |
| DEF CON 25 IoT Village - Vivek Ramachandran, Nishant Sharma, Ashish Bhangale - IIDS: IDS FOR IOT | zRkgfS0bkys | 41:14 | 148M |
| DEF CON 25 IoT Village - Vladimir Dashchenko, Sergey Temnikov - Pwning the Industrial IoT | cJcRDKN61rY | 22:49 | 86M |
| DEF CON 25 Packet Hacking Village - Marek Majkowski - IP Spoofing | 9edSBCEY_Fw | 52:04 | 126M |
| DEF CON 25 Packet Hacking Village - Ankur Tyagi - Visual Network and File Forensics | u2M14Q5JD_s | 28:58 | 105M |
| DEF CON 25 Packet Hacking Village - Brute Logic - XSS For the win | IzwCS0WhI_w | 15:26 | 47M |
| DEF CON 25 Packet Hacking Village - Catherine Ullman, Chris Roberts - Breaking the Bad News | aexJa6cgA9Y | 44:52 | 110M |
| DEF CON 25 Packet Hacking Village - Chris Wysopal - How Hackers Changed the Security Industry | srJXU7DVo7Y | 47:40 | 108M |
| DEF CON 25 Packet Hacking Village - Damon Small - Layer 8 and Why People are the Most Important | jdtm_2IoW2A | 40:01 | 135M |
| DEF CON 25 Packet Hacking Village - Daniel Adinolfi, Anthony Singleton - CVE IDs | _X5VmbdkJ1s | 46:40 | 202M |
| DEF CON 25 Packet Hacking Village - Eric Capuano - Fortune 100 InfoSec on a State Government Budget | KPbTHdbLoi8 | 49:45 | 154M |
| DEF CON 25 Packet Hacking Village - Eric Capuano - Go Beyond Tabletop Scenarios | S4WguNB8s-4 | 57:47 | 384M |
| DEF CON 25 Packet Hacking Village - Gabriel Ryan - The Black Art of Wireless Post Exploitation | Bp2JE-4VinY | 52:17 | 298M |
| DEF CON 25 Packet Hacking Village - Gilberto Bertin - Past, Present and Future of High Speed Packet | O38eY1VsWm8 | 20:17 | 97M |
| DEF CON 25 Packet Hacking Village - Gita Ziabari -Yalda: Automated Bulk Intelligence | GqAiirvD9Tg | 27:04 | 110M |
| DEF CON 25 Packet Hacking Village - Leah Figueroa - Iron Sights for Your Data | dm6bsXuYEkg | 22:45 | 75M |
| DEF CON 25 Packet Hacking Village - Megan Roddie - Strengthen Secops By Leveraging Neurodiversity | 6jN8kNyO0-k | 16:33 | 99M |
| DEF CON 25 Packet Hacking Village - Michael Gianarakis ,Keith Lee - Portia | zq3t_hmyXpU | 32:46 | 139M |
| DEF CON 25 Packet Hacking Village - Mike Raggo, Chet Hosmer - Covert TCP with a Twist | IIrzbzzNFjw | 56:08 | 222M |
| DEF CON 25 Packet Hacking Village - Peter Ewane - Cloudy With A Chance of Persistence | FAWv-4WsIP0 | 33:59 | 91M |
| DEF CON 25 Packet Hacking Village - Ron Taylor - Demystifying The OPM breach, WTF Really Happened | uXB4AiQw98s | 54:33 | 197M |
| DEF CON 25 Packet Hacking Village - Sam Erb - You're Going to Connect to the Wrong Domain Name | izfL_tBO8Hg | 23:04 | 121M |
| DEF CON 25 Packet Hacking Village - Tan Kean Siong - Stories from a 15 days SMB Honeypot Mum | z8vPrXFa3Ws | 40:11 | 100M |
| DEF CON 25 Packet Hacking Village - Tom Sela - Fooling the Hound Deceiving Doman Admin Hunters | elf8NK1GR-M | 34:55 | 285M |
| DEF CON 25 Packet Hacking Village - Vivek Ramachandran,Thomas d'Otreppe - Make a 802.11AC Monitor | gOGytFSomA0 | 01:00:11 | 166M |
| DEF CON 25 Recon Village Jonathan Cran Attack Surface Discovery With Intrigue | kWrdxuFaEVg | 31:27 | 152M |
| DEF CON 25 Recon Village - Jason Haddix - Domain Discovery:Expanding Your Scope Like A Boss | NUsJpquFq0Q | 42:09 | 218M |
| DEF CON 25 Recon Village - Leah Figueroa - FERPA: Only Grades Are Safe; OSINT In Higher Education | riNxsbko4xw | 37:36 | 105M |
| DEF CON 25 Recon Village - Tracy Maleeff - Into the Bird's Nest: A Comprehensive Look at Twitter | x6ZFxpx1M50 | 35:05 | 140M |
| DEF CON 25 Recon Village - Winner Announcement Prize Distribution | gCMEi7gTh0A | 16:19 | 113M |
| DEF CON 25 Recon Village - Abhijeth Dugginapeddi - Recon and Bug Bounties What A Great Love Story | vCBAQKLAagA | 29:13 | 66M |
| DEF CON 25 Recon Village - Andrew Hay - An Introduction to Graph Theory for OSINT | EijTmwSgqmA | 35:01 | 73M |
| DEF CON 25 Recon Village - Anthony Russell - Building Google For Criminal Enterprises | eHp2ZhyIryc | 41:37 | 202M |
| DEF CON 25 Recon Village - Dakota Nelson -Total Recoll | uPbDySi-p2w | 11:02 | 31M |
| DEF CON 25 Recon Village - Guillermo Buendia, Yael Esquivel - How To Obtain 100 Facebooks a Day | Us1nEden6Fg | 21:25 | 51M |
| DEF CON 25 Recon Village - Inbar Raz - Do Tinder Bots Dream of Electric Toys | d5eV36wR5Ew | 29:08 | 68M |
| DEF CON 25 Recon Village - Kunal Aggarwal - DataSploit Open Source Assistant for OSINT | eun-2BMo6qY | 19:13 | 101M |
| DEF CON 25 Recon Village - Mikhail Sasonkin - Up Close and Personal: Keeping an Eye On Mobile | k0mRkhbptiA | 15:26 | 98M |
| DEF CON 25 Recon Village - Rhett Greenhagen - Skip Tracing For Fun and Profit | uBy2N0NmS2o | 43:22 | 108M |
| DEF CON 25 Recon Village - Shane MacDougal - Keynote: Seeing is Believing The Future of Recon | zhrXOQqJUvA | 44:21 | 107M |
| DEF CON 25 Recon Village - Simon Roses - OSINT Tactics on Source Code and Developers | aw0X7TimkXQ | 43:02 | 345M |
| DEF CON 25 Recon Village - Tyler Rorabaugh - DFIR Automation Orchestration Tools For OSINT Recon | c6QV8y6KZ78 | 19:00 | 70M |
| DEF CON 25 Rootz Asylum - Alex Stamos, CSO Facebook - Keynote | NB4fPiCc-jc | 14:26 | 130M |
| DEF CON 25 Rootz Asylum - Aron Rosenberg, Aaron Standridge - Hacking an Insecure WiFi Camera | z9QgSU1r0ek | 11:42 | 38M |
| DEF CON 25 Rootz Asylum - Corban Villa - Arm Mounted Weaponized Platform and Anime Viewer | 4o9nKWI0lXM | 07:11 | 68M |
| DEF CON 25 Rootz Asylum - Cory Doctorow - You are not a Digital Native and that's OK | c5Sen9CBCu0 | 20:29 | 142M |
| DEF CON 25 Rootz Asylum - David Weinman - Introduction To Cheat Engine | x-LRfh_-IGI | 21:51 | 66M |
| DEF CON 25 Rootz Asylum - Deviant - Home Depot and A Plan of Attack for Hackers | Pb026p1igoY | 13:16 | 39M |
| DEF CON 25 Rootz Asylum - EFF, Nic0 - Opening Ceremonies:A Place Where Kids Learn White Hat Hacking | OIVvRP9-b4M | 09:48 | 103M |
| DEF CON 25 Rootz Asylum - Erin Owens - Drone Wars | f8PCzwxmEAo | 22:03 | 85M |
| DEF CON 25 Rootz Asylum - Erin Owens - Hacking & Robotics v2 point 0 | 6wM5Q31zXKM | 14:05 | 123M |
| DEF CON 25 Rootz Asylum - Leonard Bailey - Everything You Need To Know About The US Dept of Justice | FTOPI-YAmao | 14:48 | 112M |
| DEF CON 25 Rootz Asylum - Patrick McCanna - Tips for Internet Privacy at College | fAo3_Jl74j4 | 15:25 | 51M |
| DEF CON 25 Rootz Asylum - Rsnake Robert Hansen - Searching The Invisible Internet | zPjgUqeQbVA | 07:58 | 27M |
| DEF CON 25 Rootz Asylum - Tarah - How To Explain Crypto To Practically Anyone | gUhqA2PRtw0 | 10:28 | 90M |
| DEF CON 25 SE Village - Billy Boatright - Nor Lose The Common Touch | e_TQTDrRyWI | 31:11 | 120M |
| DEF CON 25 SE Village - Brent White, Tim Roberts - Skills For A Red Teamer | yJCq8ajdd0U | 51:08 | 182M |
| DEF CON 25 SE Village - Chris Hadnagy - SE vs Predator: Using SE In Ways I Never Thought | PNuPkpLuaws | 52:14 | 121M |
| DEF CON 25 SE Village - Fahey Owens - Beyond Phishing – Building & Sustaining a Corporate SE Program | VeXlppLn5H4 | 30:48 | 123M |
| DEF CON 25 SE Village - Helen Thackray - Hackers Gonna Hack , But Do They Know Why? | TTx7mHzyX8c | 50:30 | 110M |
| DEF CON 25 SE Village - Jayson Street - Strategies on Securing Your Banks and Enterprises | iLPI0EGs6kY | 56:19 | 178M |
| DEF CON 25 SE Village - John Nye -The Human Factor Why Are We So Bad at Security | MgXhjUzi_I0 | 48:25 | 222M |
| DEF CON 25 SE Village - Keith Conway, Cameron Craig - Change Agents How to Affect Corp. Culture | mYRXlCGMP0Q | 46:13 | 137M |
| DEF CON 25 SE Village - Michele Fincher - Are You Killing Your Security Program? | AZw8WugNyIQ | 29:21 | 119M |
| DEF CON 25 SE Village - Robert Wood - Thematic Social Engineering | Rw0aJQnYXq0 | 39:11 | 189M |
| DEF CON 25 SE Village - Tyler Rosonke - Social Engineering With Web Analytics | 3bb87rb70jU | 32:54 | 103M |
| DEF CON 25 SE Village - Yaiza Rubio, Félix Brezo - Heavy Diving For Credentials | mxI_2On_fG8 | 30:42 | 113M |
| DEF CON 25 Voting Village - Jake Braun - Securing the Election Office A Local Response | v5UcuY33Hic | 31:25 | 322M |
| DEF CON 25 Voting Village - Barbara Simons, David Jefferson - Election Systems: More Than the Booth | 7Cw_7XFpNms | 50:06 | 321M |
| DEF CON 25 Voting Village - General Douglas Lute - National Security Implications of Voting Attacks | K7lew7XlgKk | 42:10 | 434M |
| DEF CON 25 Voting Village - Harri Hursti - Brief history of election machine hacking | ImgaEqOQlSQ | 44:46 | 125M |
| DEF CON 25 Voting Village - Joseph Hall - Election Hacking: Legal Considerations from the Civil Side | QLmREgJxFJI | 50:03 | 146M |
| DEF CON 25 Voting Village - Joseph Hall, David Jefferson - Common Misconceptions and False Parallels | ccfNSAfAyis | 49:12 | 260M |
| DEF CON 25 Voting Village - Mary Brady, Josh Franklin - The State of US Voting System Security | 9uBzqiYMzLg | 52:00 | 189M |
| DEF CON 25 Voting Village - Matt Blaze - How did we get here? A history of voting technology | x1RmNXQAydg | 55:39 | 302M |
| DEF CON 25 Wifi Village - Aardvark, Darkmatter - WIGLE Like You Mean It Maximizing Your Wardriving | fSsTgazmHCw | 48:17 | 444M |
| DEF CON 25 Wifi Village - Alexander Zakarov - Large Scale Wireless Monitoring: KISMET Packet Sniffer | j899007bkqQ | 38:59 | 105M |
| DEF CON 25 Wifi Village - Andrew Strutt - POCSAG Amateur Pager Network | TeJptg1vKY8 | 28:35 | 83M |
| DEF CON 25 Wifi Village - Andrew Strutt - Suitcase Repeater Build for UHF 70cm | CoQsYhFSjtg | 31:47 | 97M |
| DEF CON 25 Wifi Village - Balint Seeber - Hacking Some More of the Wireless World | psuEzxFJnZY | 01:46:31 | 357M |
| DEF CON 25 Wifi Village - Eric Escobar - SecureWorks: SDR Replay Attacks On Home Security Systems | PI-LyQGwrmE | 19:59 | 66M |
| DEF CON 25 Wifi Village - Matt Blaze - Sigint for the rest of us | 7awwG9aaR4c | 01:05:54 | 181M |
| DEF CON 25 Wifi Village - Nick Delewski - Failsafe: Yet Another SimpliSafe Attack Vector | iV0fGMwHVyE | 52:50 | 303M |
| DEF CON 25 Wifi Village - Robert Ghilduta - Designing An Automatic Gain Control | gAwbe-G1t-A | 51:11 | 132M |
| DEF CON 25 Wifi Village - Vivek Ramachandran, Nishant Sharma, Ashish Bhangale- Deceptacon | pA4MuhebEwA | 36:31 | 259M |
| DEF CON 25 Wifi Village - Woody, Tim Kuester - GODUMPiNG packet sniffing the Gotenna | pKP74WGa_s0 | 56:22 | 207M |
| DEF CON 26 - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator | 2NawGCUOYT4 | 46:46 | 100M |
| DEF CON 26 - Champion and Law - Building the Hacker Tracker | LcPMwCUA5dY | 27:14 | 57M |
| DEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 | jmTwlEh8L7g | 46:04 | 156M |
| DEF CON 26 - Christopher Domas - The Ring 0 Facade Awakening the Processors Inner Demons | XH0F9r0siTI | 21:28 | 49M |
| DEF CON 26 - Damien virtualabs Cauquil - You had better secure your BLE devices | VHJfd9h6G2s | 41:39 | 99M |
| DEF CON 26 - Daniel Zolnikov - A Politicians Successful Efforts to Fight Surveillance | CnB0FYndVMI | 46:41 | 133M |
| DEF CON 26 - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems | ZpZbTPYB3cU | 20:01 | 102M |
| DEF CON 26 - Foster and Ayrey - Dealing with Residual Certificates for Pre-owned Domains | gZ9_-YQ4hoY | 21:13 | 95M |
| DEF CON 26 - Guang Gong - Pwning theToughest Target, the Largest Bug Bounty in the History of ASR | I0nJ9Cke00Q | 24:47 | 51M |
| DEF CON 26 - Ian Haken - Automated Discovery of Deserialization Gadget Chains | wPbW6zQ52w8 | 41:10 | 137M |
| DEF CON 26 - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools | 9K1_ISLS5UE | 39:09 | 75M |
| DEF CON 26 - Krotofil , Wetzels - Thru the Eyes of the Attacker Designing Embedded Systems for ICS | 3x4MukvjEm8 | 51:02 | 170M |
| DEF CON 26 - Maksim Shudrak - Fuzzing Malware For Fun and Profit | bzc44WPxoxE | 35:12 | 94M |
| DEF CON 26 - Morgan Indrora Gangwere - (Ab)using Binaries from Embedded Devices for Fun and Profit | IhOzBFZ3rts | 35:17 | 123M |
| DEF CON 26 - Nirenberg and Buchwald - Reverse Engineering Hacking Documentary Series | 6FzGGKnzO20 | 49:16 | 267M |
| DEF CON 26 - sghctoma - All Your Math are Belong to Us | w-jVUSw_7ko | 45:56 | 228M |
| DEF CON 26 - Slava Makkaveev - Man In The Disk | vvfs0u1or3M | 18:03 | 89M |
| DEF CON 26 - smea - Jailbreaking the 3DS Through 7 Years of Hardening | WNUsKx2euFw | 47:28 | 69M |
| DEF CON 26 - Steven Danneman - Your Banks Digital Side Door | fhUHVGTa8mQ | 49:45 | 71M |
| DEF CON 26 - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 Sandbox | XD2CHFuaKI8 | 18:21 | 61M |
| DEF CON 26 - 0x200b - Detecting Blue Team Research Through Targeted Ads | wlKqyuefE1E | 18:26 | 74M |
| DEF CON 26 - Alexandre Borges - Ring 0 Ring 2 Rootkits Bypassing Defenses | 7AEMxaZhdLU | 32:22 | 54M |
| DEF CON 26 - Alfonso Alguacil and Murillo Moya - Playback a TLS 1 point 3 story | ZY-MYd_OvwE | 37:33 | 119M |
| DEF CON 26 - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules | Dz0C55Azn1Y | 18:53 | 40M |
| DEF CON 26 - Bai and Zheng - Analyzing and Attacking Apple Kernel Drivers | 07VqX4bbXTI | 24:23 | 78M |
| DEF CON 26 - Berta and De Los Santos - Rock appround the Clock Tracking Malware Developers | wd5OU9NvxjU | 35:02 | 81M |
| DEF CON 26 - Bui and Rao - Last mile authentication problem Exploiting the missing link | tLihGD_ugBk | 32:37 | 52M |
| DEF CON 26 - Daniel Crowley and Panel - Outsmarting the Smart City | 5z-rKz5ABgI | 34:59 | 98M |
| DEF CON 26 - David Melendez Cano - Avoiding CounterDrone Systems with NanoDrones | pVmFxJPOu9I | 37:53 | 78M |
| DEF CON 26 - delta zero and Azeem Aqil - Your Voice is My Passport | 2uoOkIUB43Q | 35:28 | 90M |
| DEF CON 26 - Douglas McKee - 80 to 0 in Under 5 Seconds | ndliGvT5pYA | 45:39 | 119M |
| DEF CON 26 - Dr Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software | 4cscBvDYP-Q | 44:55 | 123M |
| DEF CON 26 - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill Video | zIU_wVm6lrE | 41:42 | 88M |
| DEF CON 26 - Dr Rasthofer and Panel - Worrisome Security Issues in Tracker Apps | e9PdX-NmCSg | 41:57 | 157M |
| DEF CON 26 - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things | noE4o-roAWM | 01:04:08 | 311M |
| DEF CON 26 - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You | Z4w8Vbr-IFU | 21:02 | 122M |
| DEF CON 26 - Eyal Itkin, Yaniv Balmas - What the Fax?! | qLCE8spVX9Q | 44:15 | 68M |
| DEF CON 26 - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries | 711YmI_hrVs | 45:45 | 138M |
| DEF CON 26 - Gabriel Ryan - Bypassing Port Security In 2018 Defeating MacSEC and 802 1x 2010 | lX4ZnQ-pfWQ | 42:42 | 103M |
| DEF CON 26 - Galloway, Yunusov - For the Love of Money Finding and Exploiting Vulns in mPOS Systems | acBSfc9Csew | 42:30 | 94M |
| DEF CON 26 - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray | hJBunGHIvKE | 18:36 | 91M |
| DEF CON 26 - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code | Fj6wfGcKFlI | 42:27 | 154M |
| DEF CON 26 - HuiYu and Qian - Breaking Smart Speakers We are Listening to You | 3sLC0XaqvMg | 42:56 | 114M |
| DEF CON 26 - Izycki and Colli - Digital Leviathan A Comprehensive List of Nation State Big Brothers | TZL_leHf1Ho | 19:51 | 68M |
| DEF CON 26 - Jeanette Manfra - Securing our Nations Election Infrastructure | wquO3jEwHes | 19:34 | 91M |
| DEF CON 26 - Joe Rozner - Synfuzz Building a Grammar Based Retargetable Test Generation Framework | HCK0yeGQI-U | 44:14 | 257M |
| DEF CON 26 - Johnson and Stavrou - Vulnerable Out of the Box - Evaluation of Android Carrier Devices | R2brQvQeTvM | 44:12 | 117M |
| DEF CON 26 - Josep Pi Rodriguez - WingOS: How to Own Millions of Devices . | fo88O1i-Z3M | 42:07 | 150M |
| DEF CON 26 - Josh Mitchell - Ridealong Adventures: Critical Issues with Police Body Cameras | X34taF1R7sU | 45:47 | 144M |
| DEF CON 26 - Kim and Choi - Your Watch Can Watch You! Pitfalls in the Samsung Gear Smartwatch | 3IdgBwbOT-g | 36:31 | 128M |
| DEF CON 26 - Ladar Levison, hon1nbo - Booby Trapping Boxes | XrzIjxO8MOs | 42:14 | 306M |
| DEF CON 26 - Lane Broadbent - Trouble in the Tubes How Internet Routing Security Breaks Down | HIM4UwibBo4 | 46:27 | 110M |
| DEF CON 26 - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF | VUZGZnpSg8I | 19:18 | 51M |
| DEF CON 26 - Levinson and Borges - Ill See Your Missile and Raise You A MIRV | 04WeAwSQja0 | 46:29 | 224M |
| DEF CON 26 - m010ch - Please Do Not Duplicate Attacking the Knox Box | f4rPDF993qs | 18:47 | 33M |
| DEF CON 26 - Matt King - Micro Renovator Bringing Processor Firmware up to Code | nN1f8gE7rV0 | 17:30 | 84M |
| DEF CON 26 - Matt Wixey - Betrayed by the Keyboard How What You Type Can Give You Away | Xt17ZlQbF9o | 40:16 | 95M |
| DEF CON 26 - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators | L3AniAxp_G4 | 20:00 | 49M |
| DEF CON 26 - Nick Cano - Relocation Bonus Attacking the Windows Loader | SseZ_t9DToo | 32:35 | 126M |
| DEF CON 26 - Orange Tsai - Breaking Parser Logic Take Your Path Normalization Off and Pop 0Days Out | 28xWcRegncw | 43:16 | 130M |
| DEF CON 26 - Ossmann and Spill - Revolting Radios | tCQaMrRuIqA | 44:57 | 121M |
| DEF CON 26 - Panel - DC 101 Panel | lM8TaHwkgyw | 50:14 | 144M |
| DEF CON 26 - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks | -WfP2VVhTt0 | 39:22 | 142M |
| DEF CON 26 - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls | UlT5KFTMn2k | 20:07 | 69M |
| DEF CON 26 - Patrick Wardle - The Mouse is Mightier than the Sword | gLrB7enpbiw | 45:39 | 83M |
| DEF CON 26 - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron | BNAqdEpsYxc | 45:09 | 227M |
| DEF CON 26 - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain | xKYIde5jh_8 | 40:04 | 173M |
| DEF CON 26 - Rob Joyce - Building Absurd Christmas Light Shows | x64mrVwuuqs | 39:49 | 132M |
| DEF CON 26 - Rob Joyce - NSA Talks Cybersecurity | gmgV4r25XxA | 43:52 | 66M |
| DEF CON 26 - Romailler and Amiet - Reaping and Breaking Keys at Scale When Crypto Meets Big Data | Z7cLRE6t1Q8 | 19:45 | 95M |
| DEF CON 26 - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly | -MaO-lmteeQ | 20:33 | 74M |
| DEF CON 26 - Rowan Phipps - ThinSIM based Attacks on Mobile Money Systems | nvI1i9njjt0 | 33:32 | 99M |
| DEF CON 26 - Ruo Ando - Asura PCAP File Analyzer for Anomaly Packets Detection | fJM-VWDRV6M | 22:26 | 97M |
| DEF CON 26 - Sanat Sharma - House of Roman a Leakless Heap Fengshui to Achieve RCE on PIE Binaries | bFHvcAWlfNA | 21:34 | 41M |
| DEF CON 26 - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband | U_awEXRp72k | 46:18 | 120M |
| DEF CON 26 - Sean Metcalf - Exploiting Active Directory Administrator Insecurities | ze1UcSLOypw | 43:39 | 125M |
| DEF CON 26 - Sheng Hao Ma - Playing Malware Injection with Exploit Thoughts | zjtqs07kQgk | 21:23 | 104M |
| DEF CON 26 - Shkatov and Michael - UEFI Exploitation for the Masses | CxqNgjMZAbk | 45:05 | 133M |
| DEF CON 26 - Si, Agent X - Wagging the Tail:Covert Passive Surveillance | tYFOXeItRFM | 47:14 | 207M |
| DEF CON 26 - singe - Practical and Improved Wifi MitM with Mana | eYsGyvGxlpI | 37:53 | 71M |
| DEF CON 26 - Svea, Suggy, Till - Inside the Fake Science Factory | ras_VYgA77Q | 01:56:08 | 421M |
| DEF CON 26 - The Dark Tangent - DEF CON 26 Closing Ceremonies | N5_dNdp8SNc | 01:31:43 | 974M |
| DEF CON 26 - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk | PQXCTOKRrNQ | 42:59 | 341M |
| DEF CON 26 - The Dark Tangent and Panel - DEF CON GROUPS | FkhPhFNb8EM | 44:06 | 422M |
| DEF CON 26 - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs | Ec1OOiG4RMA | 45:41 | 112M |
| DEF CON 26 - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures | -KHel7SyXsU | 40:28 | 72M |
| DEF CON 26 - Truman Kain - Dragnet Your Social Engineering Sidekick | KXTZ4BMEzjo | 18:30 | 88M |
| DEF CON 26 - UberKitten, magicspacekiwi - barcOwned Popping Shells with Your Cereal Box | Wy79TLkqArg | 20:46 | 79M |
| DEF CON 26 - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit | O-caTVpHWoY | 30:18 | 102M |
| DEF CON 26 - Wesley McGrew - An Attacker Looks at Docker Approaching Multi Container Applications | -Ug2vmRiI8g | 40:11 | 118M |
| DEF CON 26 - William Martin - One Click to OWA | Flx5KdHOhqc | 20:56 | 59M |
| DEF CON 26 - William Martin - SMBetray Backdooring and Breaking Signatures | BTksOzOcPPk | 37:32 | 235M |
| DEF CON 26 - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Con | SiZ-i8CxLic | 18:31 | 66M |
| DEF CON 26 - yawnbox - Privacy Infrastructure Challenges and Opportunities | cs6a1i4Owic | 32:01 | 146M |
| DEF CON 26 - Yu Wang - Attacking the macOS Kernel Graphics Driver | TEKOm0J2sHQ | 35:24 | 127M |
| DEF CON 26 - Zach and Alex - Infecting The Embedded Supply Chain | XeiET4FuGjE | 21:54 | 69M |
| DEF CON 26 - Zeng and Panel - Lora Smart Water Meter Security Analysis | b7ekygjC3so | 23:20 | 106M |
| DEF CON 26 - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear | C7SIL_JNSto | 18:44 | 51M |
| DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits | HsievGJQG0w | 48:14 | 104M |
| DEF CON 26 - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs | 0_E2NxpCAfw | 48:39 | 108M |
| DEF CON 26 - Zhenxuan Bai and Panel - Replay Attacks on Ethereum Smart Contracts | uBU3Myiauls | 39:03 | 114M |
| DEF CON 26 = Richard Thieme - The Road to Resilience How Real Hacking Redeems a Damnable Profession | WHpFSIYlVoc | 45:57 | 155M |
| DEF CON 26 AI VILLAGE - Clarence Chio and Panel - Opening Remarks | 3WOKByCwViw | 03:14 | 33M |
| DEF CON 26 AI VILLAGE - infosecanon - The Current State of Adversarial Machine Learning | TlAUp1S-6W0 | 16:14 | 166M |
| DEF CON 26 AI VILLAGE - Alex Long - AI DevOps Behind the Scenes of a Global AV Company | eNpHytykSuw | 14:00 | 103M |
| DEF CON 26 AI VILLAGE - Andrew Morris - Identifying and Correlating Anomalies in Internetwide Scan | D09MkTeQfOQ | 23:08 | 153M |
| DEF CON 26 AI VILLAGE - Andy Applebaum - Automated Planning for the Automated Red Team | zLVmbOdIhIs | 27:29 | 189M |
| DEF CON 26 AI VILLAGE - Ariel Herbert Voss - Machine Learning Model Hardening For Fun and Profit | UyL3yN2R7hs | 17:57 | 114M |
| DEF CON 26 AI VILLAGE - Aylin Caliskan - The Great Power of AI Algorithmic Mirrors of Society | wr5EeYXA5ys | 35:37 | 181M |
| DEF CON 26 AI VILLAGE - bodaceacat and Panel - Responsible Offensive Machine Learning | WXSiExdfMKU | 36:37 | 387M |
| DEF CON 26 AI VILLAGE - Brian Genz - Generating Labeled Data From Adversary Sims with MITRE ATT&CK | e0UREvVVdPk | 38:25 | 325M |
| DEF CON 26 AI VILLAGE - Chris Gardner - Chatting with Your Programs to Find Vulnerabilities | NuF8FnfFw8I | 13:19 | 73M |
| DEF CON 26 AI VILLAGE - Clarence Chio and Panel - Closing Notes and Prizes | V6owAidDwss | 00:52 | 8M |
| DEF CON 26 AI VILLAGE - drhyrum and Panel - Malware Panel | EN9_YfBDwk8 | 25:16 | 208M |
| DEF CON 26 AI VILLAGE - Fedor Sakharov - Detecting Web Attacks with Recurrent Neural Networks | iwE_yi2ndT4 | 32:41 | 219M |
| DEF CON 26 AI VILLAGE - Ivan Torroledo - DeepPhish Simulating the Malicious Use of AI | KOkAgRNBZmY | 15:27 | 155M |
| DEF CON 26 AI VILLAGE - Kang Li - Beyond Adversarial Learning Security Risks in AI Implementations | K_bAghxEXAc | 13:39 | 87M |
| DEF CON 26 AI VILLAGE - Mark Mager - Rapid Anomaly Detection via Ransom Note File Classification | _LLWBAABImE | 38:58 | 351M |
| DEF CON 26 AI VILLAGE - Matt - It is a Beautiful Day in the Malware Neighborhood | hNC36piJ80Q | 27:27 | 159M |
| DEF CON 26 AI VILLAGE - Raphael Norwitz - StuxNNet Practical Live Memory Attacks on Machine Learning | lhi0CkoHGHY | 19:56 | 53M |
| DEF CON 26 AI VILLAGE - Rob Brandon - JMPgate Accelerating Reverse Engineering Into Hyperspace | R76ZN_kRn_c | 35:14 | 198M |
| DEF CON 26 AI VILLAGE - Shankar and Kumar - Towards a Framework to Quantitatively Assess AI Safety | _EM-Q4-ym54 | 31:30 | 80M |
| DEF CON 26 AI VILLAGE - Sven Cattell - Adversarial Patches | y1w2srpQ4u8 | 22:03 | 152M |
| DEF CON 26 AI VILLAGE - TonTon Huang - Hunting the Ethereum Smart Contract Color Inspired Inspection | vpeUD0muCB0 | 26:47 | 83M |
| DEF CON 26 BCOS Monero Village - Shamiq and Panel - Greatest Questions | vIQq1sAe0Dw | 01:04:41 | 309M |
| DEF CON 26 BCOS - Monero Village - Welcome Speech | V8avoNBRbGE | 39:34 | 402M |
| DEF CON 26 BCOS Monero Village - Anonimal - An Introduction to Kovri | PRSRHakFS3g | 01:44:26 | 164M |
| DEF CON 26 BCOS Monero Village - Anonimal- Monero Projects Vulnerability Response Process | RrCAuxXssRM | 22:16 | 112M |
| DEF CON 26 BCOS Monero Village - Diego rehrar Salazar - Village Summary | GfpucsrX6Is | 44:45 | 219M |
| DEF CON 26 BCOS Monero Village - Fluffy Pony - Moneros Emerging Applications | LjM3GTBaUvo | 42:23 | 208M |
| DEF CON 26 BCOS Monero Village - Francisco ArticMine Cabañas - Scaling and Economic Implications | 0EKuEfOI86I | 01:02:09 | 193M |
| DEF CON 26 BCOS Monero Village - Howard hyc Chu - Inside Monero | 9SuzXZj9FIk | 53:38 | 402M |
| DEF CON 26 BCOS Monero Village - Justin Ehrenhofer - Examining Moneros Ring Signatures | SAzYkg3wuHs | 32:25 | 67M |
| DEF CON 26 BCOS Monero Village - Marko Bencun - A Rundown of Security Issues in Crypto Wallets | ljSA51FZKdE | 25:12 | 276M |
| DEF CON 26 BCOS Monero Village - Michael Schloh - We Dont Need No Stinkin Badges | V9fbWEfUpC8 | 23:55 | 223M |
| DEF CON 26 BCOS Monero Village - Michael Schloh - We Program Our Stinkin Badges | AqC-zIKGYa8 | 01:07:08 | 320M |
| DEF CON 26 BCOS Monero Village - Pearson and Honigwachs - Hacking a Crypto Payment Gateway | pIzJ5OXo8M0 | 13:31 | 111M |
| DEF CON 26 BCOS Monero Village - Philip Martin - BCOS Keynote | lIGbNTbMd-A | 01:02:10 | 689M |
| DEF CON 26 BIO HACKING VILLAGE - Erin Foster Hefley - Hacking Human Fetuses | u8TYdVN3CZE | 37:14 | 305M |
| DEF CON 26 BIO HACKING VILLAGE - Anne Kim - Selfie or Mugshot | Jni4o947OjA | 37:14 | 160M |
| DEF CON 26 BIO HACKING VILLAGE - BiaSciLab - WaterBot The Hackable Plant Control System | AZ9uRYzTLOI | 19:21 | 126M |
| DEF CON 26 BIO HACKING VILLAGE - Chris Roberts - Our Evolutionary Path in 45 Minutes | 9JnX1Ra0bLQ | 33:56 | 186M |
| DEF CON 26 BIO HACKING VILLAGE - DAY ONE | uDxVS8ok4Iw | 02:21:34 | 1G |
| DEF CON 26 BIO HACKING VILLAGE - Gerald R Scott - Workplace Accommodation for Autisics | Zj7DR7JoPnU | 34:21 | 308M |
| DEF CON 26 BIO HACKING VILLAGE - Guy Propper - Exploiting Immune Defenses Can Malware Learn from Bio | MYxBIy0hB18 | 22:04 | 152M |
| DEF CON 26 BIO HACKING VILLAGE - Joel Murphy - Biohacking Village Microfluidics Badge | Nm4n-XhqERY | 14:38 | 70M |
| DEF CON 26 BIO HACKING VILLAGE - John Dunlap - DNA Encryption Bioencryption to Store Secrets | sw_D-12S1G0 | 26:11 | 156M |
| DEF CON 26 BIO HACKING VILLAGE - Michael Laufer - The Four Thieves Vinegar Collective | FzqEJM8B0h4 | 51:53 | 328M |
| DEF CON 26 BIO HACKING VILLAGE - Vee - PWN to Own My Heart | skUydi_4bIA | 45:34 | 114M |
| DEF CON 26 BIO HACKING VILLAGE -Vlad Gostomelsky - Jumping the Epidermal Barrier | fZKAQ_HCvSI | 18:47 | 175M |
| DEF CON 26 BLUE TEAM VILLAGE - Andy Applebaum - Stop Drop and Assess your SOC | SMKVkpzGhOs | 40:36 | 78M |
| DEF CON 26 BLUE TEAM VILLAGE - IrishMASMS - Evolving Security Operations to the Year 2020 | m-FcPVJ3x-0 | 41:35 | 79M |
| DEF CON 26 BLUE TEAM VILLAGE - Rik van Duijn and Leandro Velasco - Open Source Endpoint Monitoring | qs6sTVffx8Q | 42:30 | 90M |
| DEF CON 26 BLUE TEAM VILLAGE - jtpereyda - Hacking Your Dev Job to Save the World | XsJi_1LabJw | 36:02 | 96M |
| DEF CON 26 BLUE TEAM VILLAGE - LadyRed6 - SAEDAY Subversion and Espionage Directed Against You | vSfTm5GVWDM | 49:20 | 106M |
| DEF CON 26 BLUE TEAM VILLAGE - Plug, mwguy - How Not to Suck at Vulnerability Management at Scale | R5iP2dX88gE | 41:29 | 158M |
| DEF CON 26 BLUE TEAM VILLAGE - rainbow tables - Automating DFIR The Counter Future | jr0ZWGM2TDk | 28:22 | 49M |
| DEF CON 26 BLUE TEAM VILLAGE - sm0kem - Effective Log and Events Management | 3yYD3CYiwx4 | 20:29 | 74M |
| DEF CON 26 BLUE TEAM VILLAGE - Xavier Ashe - Cloud Security Myths | W_O7mziH3vM | 44:52 | 87M |
| DEF CON 26 CAAD VILLAGE - Guo, and Cuevas - Recent Progress in Adversarial Deep Learning | i_6YSQdq-K0 | 18:38 | 116M |
| DEF CON 26 CAAD VILLAGE - Joseph Clements - Hardware Trojan Attacks on Neural Networks | 0At0g4IIbAQ | 24:38 | 159M |
| DEF CON 26 CAAD VILLAGE - Zhao and Zhao - Adversarial 2 Training | gcrqC7M5uec | 11:33 | 48M |
| DEF CON 26 CAAD VILLAGE - Zhuang Zhang and Panel - Weapons for Dog Fight Adapting Malware | SDg5FzTvyPM | 22:58 | 125M |
| DEF CON 26 CAAD VILLAGE - Weilin Xu and Panel - The Vanishing Trick for Self driving Cars | iUwQjm8x-5w | 27:30 | 178M |
| DEF CON 26 CAAD VILLAGE - Alzantot and Sharma - Practical Adversarial Attacks | ttmm2yo74z8 | 32:39 | 160M |
| DEF CON 26 CAAD VILLAGE - Hou and Zhou - Transferable Adversarial Perturbations | BIpz4n0RWO4 | 09:52 | 58M |
| DEF CON 26 CAAD VILLAGE - Li and Jiao - How to Leverage the Open Source Information | __5H-MopPts | 37:16 | 169M |
| DEF CON 26 CAAD VILLAGE - Taori and Kamsetty - Targeted Adversarial Examples for Black Box Audio | ofPPObIXdpI | 21:43 | 120M |
| DEF CON 26 CAAD VILLAGE - Xingxing Wei and Panel - Boosting Adversarial Attacks with Momentum | Pu2WQnU0GzA | 17:28 | 78M |
| DEF CON 26 CANNABIS VILLAGE - Rex - Cruising Cannabis Highway Major Breaches in Cannabis Software | 0-jABMp5n4k | 35:56 | 187M |
| DEF CON 26 CANNABIS VILLAGE - Adrian and Alex - An Overview of Hydroponic Grow Techniques | SkAnOUZFnok | 42:32 | 89M |
| DEF CON 26 CANNABIS VILLAGE - Annie Rouse - The Real History of Marijuana Prohibition | xlectGfuPmQ | 42:37 | 100M |
| DEF CON 26 CANNABIS VILLAGE - Beth Schechter - About the Open Cannabis Project | IN8GUKVZQCg | 42:18 | 224M |
| DEF CON 26 CANNABIS VILLAGE - Cristina Munoz - Weed Hacking A Pragmatic Primer For Home Grows | Oia6me5QrbQ | 48:42 | 94M |
| DEF CON 26 CANNABIS VILLAGE - Harry Moreno - Diagnosing Sick Plants with Computer Vision | CsRYAUlb6_E | 21:12 | 52M |
| DEF CON 26 CANNABIS VILLAGE - Keith Conway and Frank - The Invisible Hands Tending the Secret Greens | aE317y990qI | 47:02 | 275M |
| DEF CON 26 CANNABIS VILLAGE - Kevin Chen - THC Producing Genetically Modified Yeast | 1gUXtBuI-tY | 28:36 | 79M |
| DEF CON 26 CANNABIS VILLAGE - Mark Lewis - Hacking Phenotypic Pathways In Cannabis | Mg5qlHHCocY | 47:13 | 102M |
| DEF CON 26 CANNABIS VILLAGE - Mayor Chad Wanke - Primer On Dealing with Local Gov for Legal Cannabis | SgKAoFgYIuo | 49:04 | 128M |
| DEF CON 26 CANNABIS VILLAGE - Michael Hiller - The Ongoing Federal Lawsuit Against Jeff Sessions | ZHNC9QqT3wg | 39:04 | 85M |
| DEF CON 26 CANNABIS VILLAGE - Weed Anon - Compliance and Infosec Within the Cannabis Industry | UE3KlV3p2l8 | 24:27 | 159M |
| DEF CON 26 CAR HACKING VILLAGE - Ben - CANT | TRn_Rz2JIYQ | 48:40 | 267M |
| DEF CON 26 CAR HACKING VILLAGE - Ben - Misbehavior Detection in V2X Networks | gipx2tR1v9c | 52:19 | 122M |
| DEF CON 26 CAR HACKING VILLAGE - Ben Gardiner - CAN Signal Extraction from OpenXC with Radare2 | UoevuAS-4dM | 23:40 | 255M |
| DEF CON 26 CAR HACKING VILLAGE - Dan Regalado - Meet Salinas, 1st SMS commanded Car Infotainment RAT | j3dfgTKa7pQ | 01:00:59 | 232M |
| DEF CON 26 CAR HACKING VILLAGE - Eric Evenchick - Go Hack Cars | PlOj0Mt-2NM | 14:17 | 154M |
| DEF CON 26 CAR HACKING VILLAGE - Jerry Gamblin - So You Want To Hack A Car | YFMqGyWyWCo | 12:02 | 38M |
| DEF CON 26 CAR HACKING VILLAGE - KEVIN2600 - Grand Theft Auto Digital Key Hacking | v6uCBNfIfMM | 45:41 | 118M |
| DEF CON 26 CAR HACKING VILLAGE - Nathaniel Boggs - Automotive Exploitation Sandbox | bK3SFDKvkHQ | 22:48 | 170M |
| DEF CON 26 CAR HACKING VILLAGE - Phil Lapczynski - Flash Bootloaders Exposing Automotive ECU updates | RQBf3x6SCu0 | 34:19 | 131M |
| DEF CON 26 CAR HACKING VILLAGE - Vlad - Evidence Collection Automotive Driving Aids and Liability | i3S9wiHF8c0 | 22:50 | 70M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Adam Everspaugh - Revolutionizing Auth with Oblivious Crypto | HVKHvndazbU | 26:49 | 70M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Barnhart Magen and Caltum - JARVIS never saw it coming | Obz_FHriEnw | 45:47 | 90M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Brendan OConnor - Probably an Irreverent Overview of GDPR | iY1lu3ak27U | 52:40 | 184M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Catarineu and Modi - Anonymous Rate Limiting in Services | Eblwm-h9sWs | 27:45 | 111M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Caudill, Hornby - Announcing the Underhanded Crypto Contest | SYUBOLIbxPE | 11:54 | 27M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Christian Paquin - Integrating Post Quantum Crypto | SCdaYAFx7hw | 46:45 | 89M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Cowley and Taggart - Two Steps to Owning MFA | i8Hj9TpFpjY | 47:47 | 82M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Hardin and Dalsen - Rethinking Digital Privacy Education | 7-Z1HF4W90M | 16:41 | 66M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Jeff Kosseff - Hamiltons Private Key American Exceptionalism | udybyX0Vht4 | 52:34 | 564M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Mahrud Sayrafi - Opportunistic Onion | tEQgkSuxNk4 | 19:26 | 76M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Marie Fromm - Cloud Encryption How to not suck | 7q4Bi8SJmSE | 45:49 | 208M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Matt Cheung - Prototyping Cryptographic Protocols | rB8CyUYRE9g | 47:14 | 188M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Nicholas Doiron - Geolocation and Homomorphic Encryption | ySl2ywGiFkw | 20:38 | 89M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Nox - Cicada What Puzzles Can Teach Us About Cryptography | sVU4k2gRe_Y | 34:30 | 67M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Pigeon - Jailed by a Google Search | RcPpbWurw4U | 18:19 | 31M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Reyes, Elazari, On Wont Somebody Think of the Children | kpntbgFbEcs | 23:57 | 233M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Scott Arciszewski - No Way JOSE! Designing Cryptography | RijGNytjbOI | 29:12 | 120M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Shi and Cai - Building a Cryptographic Backdoor in OpenSSL | qo5RPvL2UuQ | 12:36 | 53M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Tess Schrodinger - Cryptography Codes and Secret Writing | rj8y6sQavRE | 01:18:00 | 250M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Urquhart - Hiding in plain sight Disguising HTTPS traffic | pPu15-rYQw8 | 35:36 | 119M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Wall, Frederickson - Library 4 Pairing-based TransformCrypto | xo8rfF6o-Gw | 44:28 | 207M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Wendy Knox Everette - Green Locks for You and Me | nfQG7GOCL-g | 20:15 | 74M |
| DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Yueting Lee - CATs A Tale of Scalable Authentication | auADZBYcG1M | 20:45 | 81M |
| DEF CON 26 DATA DUPLICATION VILLAGE - Mauro Caseres - Owning Gluster FS with GEVAUDAN | qU-9MsxjW7A | 26:28 | 151M |
| DEF CON 26 DATA DUPLICATION VILLAGE - Lior Kolnik - The Memory Remains Cold Drive Memory Forensics | sI6D_CrMr-Q | 24:22 | 149M |
| DEF CON 26 DATA DUPLICATION VILLAGE - Andy Klein - Facts figures, fun from managing 100000 HDDs | G4-cF1BMnTc | 57:42 | 189M |
| DEF CON 26 DATA DUPLICATION VILLAGE - Jessica Smith - Beginners Guide to Musical Scales of Cyberwar | 3J6r59Tl7iI | 39:30 | 172M |
| DEF CON 26 ETHICS VILLAGE - Ethical Disclosure and the Reduction of Harm | 6XkwY_F-9ko | 36:47 | 221M |
| DEF CON 26 ETHICS VILLAGE - Accountability w⧸o accountability A censorship measurement case study | JHE8DTFzBP0 | 34:53 | 367M |
| DEF CON 26 ETHICS VILLAGE - David Scott Lewis - Hack Back Not An Option But A Necessity | GcgIfYLCrDQ | 01:32:51 | 313M |
| DEF CON 26 ETHICS VILLAGE - Ethics for Security Practitioners | bmqstIIna4o | 52:48 | 544M |
| DEF CON 26 ETHICS VILLAGE - Ethics of Technology in Humanitarian and Disaster Response | DWr6ou_7514 | 01:01:51 | 293M |
| DEF CON 26 ETHICS VILLAGE - Nations and Nationalism and Cyber Security | dLXsL1Fx9U4 | 01:28:26 | 245M |
| DEF CON 26 ETHICS VILLAGE - Responsible Disclosure Panel | oogQ1OwC05M | 46:09 | 495M |
| DEF CON 26 HARDWARE HACKING VILLAGE - Commodore Z - The Cactus 6502 Blinkenlights 40 Years Late | ZlyHcgpL5aw | 50:09 | 120M |
| DEF CON 26 HARDWARE HACKING VILLAGE - David Melendez Cano - Building Drones the Hard Way | 5GSxa_VgOvk | 35:12 | 160M |
| DEF CON 26 HARDWARE HACKING VILLAGE - John Aho - WiFi Beacons will give you up | 1XoxtcBGga0 | 27:13 | 147M |
| DEF CON 26 HARDWARE HACKING VILLAGE - Mike Davis - Hacking your HackRF | 4Gw7l0DBR0g | 19:51 | 87M |
| DEF CON 26 HARDWARE HACKING VILLAGE - Salvador Mendoza - NFC Payments The Art of Relay & Replay | MVU3gbPnk0g | 26:38 | 64M |
| DEF CON 26 ICA VILLAGE - Thomas VanNorman - A SOC in the Sandbox | I_npMq0o480 | 13:12 | 72M |
| DEF CON 26 ICA VILLAGE - Brandon Workentin - A CTF That Teaches | QnbjqTv9zto | 29:48 | 324M |
| DEF CON 26 ICA VILLAGE - Bryson Bort - TOR for The IOT aka TORT Reform | KD0ZvYB72jQ | 30:01 | 194M |
| DEF CON 26 ICA VILLAGE - DeSantis and Pacho - Analyzing VPNFilters Modbus Module | 2ds0yDzuLhs | 41:54 | 228M |
| DEF CON 26 ICA VILLAGE - Harris and Aguayo - Securing Critical Infrastructure through Side Channel | hI93jhqXB0U | 28:39 | 169M |
| DEF CON 26 ICA VILLAGE - Joe Slowik - Behavior Based Defense in ICS Environments | iFOGPZazgFI | 35:35 | 190M |
| DEF CON 26 ICA VILLAGE - Keiser and Barenz - How can industrial IoT be protected | Dx3fFpYwokU | 20:23 | 127M |
| DEF CON 26 ICA VILLAGE - Mike Godfrey - How We Cost Our Client 1 point 2M with 4 lines of code | w6Ng8OEnI3g | 28:08 | 112M |
| DEF CON 26 ICA VILLAGE - Monta Elkins - Disassembly and Hacking of Firmware Where You Least Expect | CYfNAG9MFY0 | 35:35 | 83M |
| DEF CON 26 IoT VILLAGE - Amit Elazari - Internet of Laws Navigating to IoT Hacking Legal Landscape | dFvICfeLueU | 36:43 | 249M |
| DEF CON 26 IoT VILLAGE - Ben Nassi - Attacking Commercial Smart Irrigation Systems | M5S2-PdvGc4 | 39:24 | 122M |
| DEF CON 26 IoT VILLAGE - David Tomaschik - Im the One Who Doesnt Knock Unlocking Doors from Network | SwOy0zRW5Dk | 38:11 | 220M |
| DEF CON 26 IoT VILLAGE - Dennis Giese - How to modify ARM Cortex M based firmware A step by step app | Qvxa6o2oNS0 | 47:03 | 114M |
| DEF CON 26 IoT VILLAGE - Erez Yalon - Your Smart Scale is Leaking More than Your Weight | -YnxRe_Y_bo | 30:37 | 71M |
| DEF CON 26 IoT VILLAGE - John Dunlap - FPGAs a new attack surface for embedded adversaries | Rjd3DP5W8Z0 | 29:13 | 66M |
| DEF CON 26 IoT VILLAGE - Lee and Park - Exploiting the IoT hub What happened to my home | po_NeAECffA | 34:57 | 90M |
| DEF CON 26 IoT VILLAGE - Matt Wixey - Worms that fight back Nematodes as an antidote for IoT malware | SrVeLNGcbBE | 37:29 | 203M |
| DEF CON 26 IoT VILLAGE - Ramgattie and Holcomb - IoT Village Keynote The Road To SOHOpelessly Broken | 04v2Us5eTLU | 27:25 | 107M |
| DEF CON 26 IoT VILLAGE - Stephen Hilt - The Sound of a Targeted Attack Attacking IoT Speakers | zzgmWlCfCRU | 29:22 | 82M |
| DEF CON 26 IoT VILLAGE - Veronica Schmitt - Internet of Medicine The ultimate key to Rooting the hum | vZLD6pUtqQM | 41:29 | 143M |
| DEF CON 26 PACKET HACKING VILLAGE - Alex Stanev - wpa sec The Largest Online WPA Handshake Database | ZjTmrakUc3o | 18:17 | 41M |
| DEF CON 26 PACKET HACKING VILLAGE - Andrew Johnson - Building a Teaching SOC | MCHbyVLHjAE | 18:09 | 57M |
| DEF CON 26 PACKET HACKING VILLAGE - Caleb Madrigal - Mapping Wi Fi Networks and Triggering | GpfUe5slVqo | 35:30 | 84M |
| DEF CON 26 PACKET HACKING VILLAGE - Chen and Yang - Grand Theft Auto Digital Key Hacking | TS9LOaFDRFE | 40:30 | 239M |
| DEF CON 26 PACKET HACKING VILLAGE - Chris Hanlon - Holes in the Foundation of Modern Security | f4Is62csQQk | 24:58 | 105M |
| DEF CON 26 PACKET HACKING VILLAGE - Ed Miles - Bitsquatting Passive DNS Hijacking | yKeB8c6Kz_g | 16:35 | 88M |
| DEF CON 26 PACKET HACKING VILLAGE - Garett Montgomery - Target Based Security Model | nRNMH2AB-rM | 42:17 | 234M |
| DEF CON 26 PACKET HACKING VILLAGE - gh057 - Microcontrollers and Single Board Computers for Hacking | dm_GbEaB4hM | 28:18 | 95M |
| DEF CON 26 PACKET HACKING VILLAGE - Gita Ziabari = How to Tune Automation to Avoid False Positives | hHmxZxJ-eEY | 17:47 | 81M |
| DEF CON 26 PACKET HACKING VILLAGE - Hadar Yudovich, Panel - Tricking Hackers with OSINT | VKwBlKoh8fE | 19:34 | 39M |
| DEF CON 26 PACKET HACKING VILLAGE - Jay Turla - Car Infotainment Hacking Methodology, Attack Surf | F0mYkI2FJ_4 | 30:55 | 181M |
| DEF CON 26 PACKET HACKING VILLAGE - Kat Sweet = Rethinking Role Based Security Education | vDDWWAZ-GkE | 41:46 | 391M |
| DEF CON 26 PACKET HACKING VILLAGE - Lokesh Pidawekar - An OSINT Approach to 3rd Party Cloud Services | b9B3Dn40rQ0 | 22:20 | 108M |
| DEF CON 26 PACKET HACKING VILLAGE - Muniz and Lakhani - Fishing for Phishers Enterprise Strikes Back | PXd09Tj8CF4 | 43:31 | 152M |
| DEF CON 26 PACKET HACKING VILLAGE - Pedro Fortuna - Protecting Crypto Exchanges From MIB Attacks | ngsR6ExHbmo | 51:17 | 215M |
| DEF CON 26 PACKET HACKING VILLAGE - Robert Olson - Analysis of Cybersecurity Educational Standards | 6SKL0QWcFTc | 20:57 | 50M |
| DEF CON 26 PACKET HACKING VILLAGE - Rogan Dawes - Mallet A Proxy for Arbitrary Traffic | 7kGFqYu07jg | 51:58 | 225M |
| DEF CON 26 PACKET HACKING VILLAGE - Sam Erb - Defense in Depth The Path to SGX at Akamai | gU6Zehq-eXM | 18:15 | 88M |
| DEF CON 26 PACKET HACKING VILLAGE - Silas Cutler - Capturing in Hard to Reach Places | SsAQJ-qx2EI | 14:04 | 67M |
| DEF CON 26 PACKET HACKING VILLAGE - TryCatchHCF - PacketWhisper Stealthily Exfiltrating Data | 9CoZUulhiwo | 50:13 | 98M |
| DEF CON 26 PACKET HACKING VILLAGE = Sen and Sinturk - Normalizing Empires Traffic to Evade IDS | Cz1duUCIM-g | 21:42 | 58M |
| DEF CON 26 R00TZ ASYLUM VILLAGE - Day 1 | EDJGuJVIoZY | 01:37:46 | 411M |
| DEF CON 26 R00TZ ASYLUM VILLAGE - Day 2 | -wcUTMqb8as | 01:43:29 | 418M |
| DEF CON 26 RECON VILLAGE - Andrew Mohawk - KEYNOTE From Breach to Bust | dUC0IocFm4k | 36:33 | 172M |
| DEF CON 26 RECON VILLAGE - Anshuman Bhartiya, Glenn Grant - Bug Bounty Hunting on Steroids | 7WYjSDZxFYc | 37:45 | 203M |
| DEF CON 26 RECON VILLAGE - Caleb Madrigal - Mapping wifi networks for interesting traffic patterns | 4w8aS1VfAak | 21:18 | 43M |
| DEF CON 26 RECON VILLAGE - chenb0x - Stalker In A Haystack | x3QbTP0HTuQ | 34:15 | 72M |
| DEF CON 26 RECON VILLAGE - Dino Covotsos - Hacking the international RFQ Process killthebuzzwords | 5ttxIMlNKDc | 28:21 | 281M |
| DEF CON 26 RECON VILLAGE - Ethan Dodge - How WHOIS Data Uncovered $32b Connected to Mormon Church | p859ySfD7MQ | 16:32 | 40M |
| DEF CON 26 RECON VILLAGE - evilbotnet - OpenPiMap Hacking the hackers with OSINT Raspberry Pis | T606xnmY1DA | 13:53 | 64M |
| DEF CON 26 RECON VILLAGE - Jacob Wilkin - Mapping Social Media with Facial Recognition | ejEkjbAyAMc | 07:57 | 24M |
| DEF CON 26 RECON VILLAGE - Jennifer Roderick - 1983 Im born 2018 Im taking on the bad guys | WmV_4Ys_uMk | 18:09 | 85M |
| DEF CON 26 RECON VILLAGE - jhaddix - Emergent Recon fresh methodology and tools for hackers in 201 | 1j6MNApbYtE | 01:07:42 | 384M |
| DEF CON 26 RECON VILLAGE - Lloyd Miller - Applied OSINT For Politics Turning Open Data Into News | RfT5-EPy7qc | 46:21 | 292M |
| DEF CON 26 RECON VILLAGE - marc dacosta - Adventures in the dark web of government data | 8f4b9Ij6-cs | 28:10 | 58M |
| DEF CON 26 RECON VILLAGE - mauroeldritch - I fought the law and law lost Video | 9k8qmH1lVrg | 43:43 | 147M |
| DEF CON 26 RECON VILLAGE - mgianarakis - Supercharge Your Web Recon With Commonspeak | GxkuBFUfnL8 | 21:57 | 35M |
| DEF CON 26 RECON VILLAGE - Recon Village Team - Hackathon and CTF Prizes Video | Eq2jax963xw | 11:50 | 79M |
| DEF CON 26 RECON VILLAGE - Recon Village Team - Hackathon Product Showcase | B-UQdIBOSa0 | 22:38 | 83M |
| DEF CON 26 RECON VILLAGE - trustartech - WhiteRabbit Combining Threat Intelligence Public Blockchain | -1Gn_qiMWpY | 27:10 | 50M |
| DEF CON 26 RECON VILLAGE - Undisclosed - Targeted User Analytics and Human Honeypots | K6LJnr29JPo | 21:18 | 64M |
| DEF CON 26 RECON VILLAGE - Undisclosed - Winning a SANS 504 CTF without winning a SANS CTF | 8_vWIBGebP8 | 21:10 | 119M |
| DEF CON 26 RECON VILLAGE - upgoingstar and sudhanshu c - Closing Note | qTERuof4Mfc | 02:24 | 16M |
| DEF CON 26 RECON VILLAGE - upgoingstar, sudhanshu c - Opening Note | 3UWQ1fEYAMg | 03:35 | 24M |
| DEF CON 26 RECON VILLAGE - victoris - Prebellico 100 Perfect Passive Pre-engagement⧸Post Compromise | b5VpLUl0Yws | 37:51 | 277M |
| DEF CON 26 RECON VILLAGE - WebBreacher - Core OSINT Keeping Track of and Reporting All the Things | F2u6H90eMMg | 38:44 | 60M |
| DEF CON 26 RECON VILLAGE - xillwillx - skiptracer Ghetto OSINT for Broke Hackers | 3mEOkwrxfsU | 27:25 | 138M |
| DEF CON 26 RECON VILLAGE - yamakira - Building Visualisation Platforms for OSINT Data Using OSS | _r-1Z3yQVa4 | 01:37:17 | 212M |
| DEF CON 26 RECON VILLAGE -WebBreacher - Introducing YOGA Your OSINT Graphical Analyzer | ApB1FibIquE | 15:24 | 160M |
| DEF CON 26 SE VILLAGE - Aunshul Rege - Social Engineering Course Projects for Undergrads | zp5FxnuFg7g | 50:45 | 105M |
| DEF CON 26 SE VILLAGE - Neil Fallon - MIster Sinatra Will Hack You Now | cVx5Y1OE-KE | 50:58 | 93M |
| DEF CON 26 SE VILLAGE - Billy Boatright - In-N-Out – That’s What It’s All About | YJHR2XUGrpg | 36:01 | 90M |
| DEF CON 26 SE VILLAGE - Chris Hadnagy and Panel - Hunting Predators SE Style | 9XTUbgaDBFg | 50:41 | 446M |
| DEF CON 26 SE VILLAGE - Chris Roberts - Welcome to 2018 Full Speed to the Edge of the Abyss | YAuRghpZyto | 50:26 | 148M |
| DEF CON 26 SE VILLAGE - Hannah Silvers - My Stripper Name Is Bubbles Sunset | xyF7VyFRqjY | 28:07 | 63M |
| DEF CON 26 SE VILLAGE - Pongolyn - Swarm Intelligence and Augmented Reality Gaming | bPTymsk1I_E | 30:50 | 57M |
| DEF CON 26 SE VILLAGE - Ryan MacDougall - From Introvert to SE The Journey | CHv3HwVMRg8 | 39:23 | 86M |
| DEF CON 26 SE VILLAGE- Kathleen Mullin - Social Engineering From a CISOs Perspective | F1sbd7hFFy4 | 31:05 | 161M |
| DEF CON 26 VOTING VILLAGE - Diego Aranha - Return of Software Vulns in Brazilian Voting Machines | TkoCnyhmorg | 25:18 | 53M |
| DEF CON 26 VOTING VILLAGE - Carsten Schurmann - A Comprehensive Forensic Analysis of WINVote Voting | CXYCtSwkWf8 | 24:39 | 99M |
| DEF CON 26 VOTING VILLAGE - J Alex Halderman - Election Security Threats and Solutions | 4K0YZcbbzhc | 27:18 | 72M |
| DEF CON 26 VOTING VILLAGE - Jake Braun and Panel - Recap of Voting Village 2017 Lessons Learned | lJse3DNFbaY | 42:04 | 188M |
| DEF CON 26 VOTING VILLAGE - Joseph Kiniry - Trustworthy Elections | 5s8SjbYbtdo | 27:27 | 67M |
| DEF CON 26 VOTING VILLAGE - Maggie MacAlpine - Mechanics and Pitfalls of Auditing with Scanners | vC5ycx1w904 | 09:58 | 61M |
| DEF CON 26 VOTING VILLAGE - Matthew Bernhard - Lightning Talk A Crash Course on Election Security | 9xVnP7dY2vA | 12:06 | 58M |
| DEF CON 26 VOTING VILLAGE - Neal Kelley and Panel - State, Local Perspectives on Election Security | hyTPB7OsYu8 | 55:33 | 367M |
| DEF CON 26 VOTING VILLAGE - Robert Karas - Defending Election Security A National Security Priority | T9fIPgoikYw | 45:30 | 485M |
| DEF CON 26 WIRELESS VILLAGE Aadvark and Panel Wardrivers Anonymous Video | 44OLG05smQw | 01:28:15 | 458M |
| DEF CON 26 WIRELESS VILLAGE - recompiler - Attacking Gotenna Networks | Nouu0hWIGho | 20:39 | 61M |
| DEF CON 26 WIRELESS VILLAGE - Dunlap - Learning to Listen Machine Learning for Adaptive Wireless | nctbeAfCZP8 | 28:58 | 95M |
| DEF CON 26 WIRELESS VILLAGE - Pandeya and Temple - RFNoC Accelerating The Spectrum with the FPGA | xG7Pin6otAU | 28:25 | 122M |
| DEF CON 26 WIRELESS VILLAGE - Balint Seeber - SDR Basics Class | CCNzzedU3gE | 56:18 | 174M |
| DEF CON 26 WIRELESS VILLAGE - Balint Seeber - SirenJack Cracking a Secure Emergency Siren System | 6OVo_6ZRo4Q | 55:25 | 235M |
| DEF CON 26 WIRELESS VILLAGE - Eric Reuter - Introduction to Railroad Telemetry | vloWB0LHT_4 | 55:41 | 137M |
| DEF CON 26 WIRELESS VILLAGE - FAZ - Exploring the 802 15 4 Attack Surface | sU7PlIM-nEE | 20:07 | 78M |
| DEF CON 26 WIRELESS VILLAGE - Handorf and Spill - Its not wifi stories in wireless RE | f3QfBm95dB4 | 58:37 | 237M |
| DEF CON 26 WIRELESS VILLAGE - Kitchen and Kinne - Little Fluffy Pineapple Clouds | I8Sir9VgmiE | 54:25 | 108M |
| DEF CON 26 WIRELESS VILLAGE - ryan holeman - BLE CTF | lx5MAOyu9N0 | 16:16 | 68M |
| DEF CON 26 WIRELESS VILLAGE - stev0 - BSSI finding foxes with acoustic help piClicker | BRf3WGekgHc | 16:48 | 38M |
| DEF CON 26 WIRELESS VILLAGE - t0ddpar0dy - Hunting Rogue APs Hard Lessons | jGYrE3Jw-e0 | 29:56 | 53M |
| DEF CON 26 WIRELESS VILLAGE - Travis Goodspeed - Goodwatch Update | rrwZjXIJ02M | 33:07 | 70M |
| DEF CON 26 WIRELESS VILLAGE - wasabi - Can you hear me now DEF CON | lhHM6TX2RrI | 36:13 | 67M |
| DEF CON 26 WIRELESS VILLAGE - Zero Chaos and Mellendick - Blue Sonar | xIUdtlFRdKk | 47:22 | 117M |
| DEF CON 26 WIRELESS VILLAGE - Zero Chaos and Wasabi - WEP and WPA Cracking 101 | 8uZdajW1hdI | 57:19 | 249M |
| DEF CON 27 Demo Labs CFP extended to May 12! | uX5o7Xvo7Zg | 00:12 | 1M |
| DEF CON 28 Safe Mode Career Hacking Village - Bryson Bort - Entrepreneurial Adventures | xyEEvxJKd5E | 41:45 | 138M |
| DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - LIVE | 4J4RT4oMYdA | 47:51 | 163M |
| DEF CON 29 - Joseph Gabay - DoS Denial of Shopping Analyzing and Exploiting Physical Shopping Cart | fBICDODmCPI | 31:12 | 189M |
| DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge - LIVE | ig8NFHX8wgE | 46:35 | 693M |
| DEF CON 29 - The Dark Tangent - Closing Ceremonies Live | y0S417FXWTg | 01:53:24 | 1G |
| DEF CON 29 - Policy Panel - HACKERS INTO THE UN Cyber Discussions on War and Peace - LIVE | DwpkF2alTOQ | 49:36 | 785M |
| DEF CON 29 - Agent X - A look inside security at the New York Times | U2-8MNx8nsg | 49:28 | 537M |
| DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys | BRsXsUEIU70 | 20:01 | 193M |
| DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS man Comes For Us All | NARJrwX_KFY | 40:09 | 515M |
| DEF CON 29 - Barak Sternberg - Extension Land Exploits and Rootkits in Browser Extensions - LIVE | n4iV_XMRNe8 | 37:25 | 388M |
| DEF CON 29 - Barak Sternberg - Extension Land: Exploits and Rootkits in Your Browser Extensions | PpSftQuCEDw | 48:55 | 497M |
| DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza: Writing Golang Malware | 3RQb05ITSyk | 45:29 | 826M |
| DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires | Liz9R_QxSgk | 45:11 | 232M |
| DEF CON 29 - Brian Hong - Sleight of ARM: Demystifying Intel Houdini | 9oQ5XjA1aq0 | 44:02 | 282M |
| DEF CON 29 - Cedric Owens - Gone Apple Pickin: Red Teaming MacOS Environments in 2021 | IiMladUbL6E | 52:04 | 566M |
| DEF CON 29 - Chad Seaman - UPnProxyPot: Fake the Funk, Become a Blackhat Proxy, MITM their TLS... | mHCGNUsrTf0 | 45:02 | 418M |
| DEF CON 29 - Christian Dameff MD, Jeff Tully MD, Jessica Wilkerson, Josh Corman - Do No Harm - LIVE | Pf4HJNGcMXg | 01:23:37 | 727M |
| DEF CON 29 - Christian Dameff MD, Jeff Tully MD, Jessica Wilkerson, Josh Corman - Do No Harm - PANEL | phtBJciRz54 | 57:58 | 584M |
| DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders | z4gIxdFfJDg | 40:58 | 300M |
| DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP | QofeTV39kQE | 34:55 | 369M |
| DEF CON 29 - Cory Doctorow - Privacy Without Monopoly | deRRR5B1hwI | 29:09 | 546M |
| DEF CON 29 - Dan Petro - You're Doing IoT RNG | Zuqw0-jZh9Y | 40:04 | 439M |
| DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - LIVE | jXJ9f9DBaVk | 44:30 | 456M |
| DEF CON 29 - David Dworken - Worming through IDEs | pzqu_qaoNuY | 22:49 | 172M |
| DEF CON 29 - Dimitry 'Op Nomad' Snezhkov - Use of Offensive Enclaves In Adversarial Operations | WWGkaGBtn2Q | 21:21 | 312M |
| DEF CON 29 - Dimitry 'Op Nomad' Snezhkov - Racketeer Toolkit: Prototyping Controlled Ransomware Ops | VJ8aqReB118 | 20:38 | 239M |
| DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock - Hacking Humans with AI as a Service | tWWhRbzhkrg | 26:28 | 272M |
| DEF CON 29 - Guillaume Fournier, Sylvain Afchain, Sylvain Baubeau - eBPF, I thought we were friends! | 5zixNDolLrg | 48:54 | 292M |
| DEF CON 29 - Hao Xing, Zekai Wu - How I use a JSON 0day to Steal Your Money on the Blockchain | pUexrXOGCkE | 39:46 | 438M |
| DEF CON 29 - hyp3ri0n aka Alejandro Caceres Jason Hopper - PunkSPIDER and IOStation: Making a Mess | DlS_sl4hTWg | 45:36 | 602M |
| DEF CON 29 - Ian Coldwater, Chad Rikansrud - Real Life Story of the 1st Mainframe Container Breakout | 7DXF7YDBf-g | 42:13 | 107M |
| DEF CON 29 - Ian Vitek - Central Bank Digital Currency, Threats and Vulnerabilities | -MK0bn3Ys_M | 53:37 | 315M |
| DEF CON 29 - Ionut Cernica - Hack the hackers Leaking data over SSL TLS | WNXEuFaRUkU | 19:28 | 296M |
| DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability | iWu_xHI4aDI | 42:35 | 337M |
| DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability | vdesswZYz-8 | 42:35 | 337M |
| DEF CON 29 - James Kettle - HTTP2: The Sequel is Always Worse | rHxVVeM9R-M | 40:04 | 230M |
| DEF CON 29 - Jeff Dileo - Instrument and Find Out: Parasitic Tracers for High Level Languages | Iy1BNywebpY | 21:56 | 250M |
| DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows | 9slRYvpKHp4 | 45:58 | 551M |
| DEF CON 29 - Jesse 'Agent X' Krembs - A Look Inside Security at the New York Times - LIVE | PbBxG2Npl-M | 47:21 | 567M |
| DEF CON 29 - Kelly Kaoudis, Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing | _o1RPJAe4kU | 39:38 | 241M |
| DEF CON 29 - Laura Abbott, Rick Altherr -Breaking TrustZone M: Privilege Escalation on LPC55S69 | eKKgaGbcq4o | 49:25 | 571M |
| DEF CON 29 - Mars Cheng, Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems | L0w_aE4jRFw | 42:18 | 316M |
| DEF CON 29 - Martin Doyhenard - Response Smuggling: Pwning HTTP 1 1 Connections | suxDcYViwao | 45:33 | 442M |
| DEF CON 29 - Matthew Bryant - Hacking G Suite The Power of Dark Apps Script Magic - LIVE | 6YimrCDK19A | 42:42 | 255M |
| DEF CON 29 - Matthew Bryant - Hacking G Suite: The Power of Dark Apps Script Magic | 6AsVUS79gLw | 43:51 | 314M |
| DEF CON 29 - MAVSH - Attacking from Above - LIVE | CJZ2gCLopyU | 51:32 | 407M |
| DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge | H3kdq40PY3s | 27:47 | 410M |
| DEF CON 29 - Mickey Shkatov, Jesse Michael - High Stakes Updates: BIOS RCE OMG WTF BBQ | qxWfkSonK7M | 38:51 | 375M |
| DEF CON 29 - Orange Tsai - ProxyLogon Just Tip of the Iceberg, New Attack Surface on Exchange Server | 5mqid-7zp8k | 47:37 | 668M |
| DEF CON 29 - Panel - Rebooting Critical Infrastructure Protection - LIVE | ZLGBHxs7rTU | 49:57 | 927M |
| DEF CON 29 - PatH - Warping Reality: Creating and Countering the Next Generation of Linux Rootkits | g6SKWT7sROQ | 43:05 | 485M |
| DEF CON 29 - Patrick Wardle - Bundles of Joy: Breaking MacOS via Subverted Applications Bundles | raSTgFqYaoc | 44:42 | 633M |
| DEF CON 29 - Paz Hameiri - TEMPEST Radio Station | m9WkEwshNKc | 45:00 | 539M |
| DEF CON 29 - Policy Panel - Ransomware’s Big Year From Nuisance to Scourge - LIVE | xpvtdJV5DnU | 51:07 | 921M |
| DEF CON 29 - Rex Guo, Junyuan Zeng - Phantom Attack: Evading System Call Monitoring | yaAdM8pWKG8 | 39:28 | 227M |
| DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW A Novel Covert Communication Scheme - LIVE | JeTsJCfBE5U | 44:24 | 439M |
| DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW: A Novel Covert Communication Scheme | oaLIo9HwW-g | 44:29 | 170M |
| DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E I E I CAR | cIcbAMO6sxo | 43:40 | 204M |
| DEF CON 29 - Richard Thieme AKA neuralcowboy - UFOs: Misinformation, Disinfo, and the Basic Truth | mExktWB0qz4 | 44:09 | 603M |
| DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee? | JpL3lySZNeM | 45:58 | 489M |
| DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning | Jl-CU6G4Ofc | 45:23 | 361M |
| DEF CON 29 - Roy Davis - No Key No PIN No Combo No Problem Pwning ATMs For Fun and Profit | 9cG-JL0LHYw | 47:13 | 420M |
| DEF CON 29 - Sagi Sheinfeld, Eyal Karni, Yaron Zinar - Using M(achine)ITM to Attack Active Directory | lYrNH5hmorY | 46:43 | 390M |
| DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack | VOIvEqjJNOY | 38:16 | 293M |
| DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - LIVE | meRL_JXDQpk | 27:06 | 220M |
| DEF CON 29 - Seth Kintigh - OTA remote code execution on the DEF CON 27 badge via NFMI | sDCIjcUEFj0 | 47:29 | 265M |
| DEF CON 29 - Sheila A Berta - The Unbelievable Insecurity of the Big Data Stack | vl9hk4fQdos | 41:33 | 369M |
| DEF CON 29 - Shir Tamari, Ami Luttwak - New class of DNS Vulns Affecting DNS-as-Service Platforms | 72uzIZPyVjI | 26:12 | 354M |
| DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulns | zpouLO-GXLo | 27:12 | 81M |
| DEF CON 29 - Slava Makkaveev - I know how to take over your Kindle with an e-book | 1jM_r-pe8Ss | 18:59 | 218M |
| DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen | _dXC_I2ybr4 | 43:00 | 313M |
| DEF CON 29 - The Dark Tangent, Panel - DEF CON 102 - LIVE | BWXAmImiNZA | 45:12 | 894M |
| DEF CON 29 - Thomas Roth - Hacking the Apple AirTags | paxErRRsrTU | 38:31 | 145M |
| DEF CON 29 - Tianze Ding - Vulnerability Exchange: One Domain Account For More Than Exchange Server | 7h38rI8KT30 | 45:46 | 262M |
| DEF CON 29 - Tom Van Goethem, Mathy Vanhoef - Timeless Timing Attacks | s5w4RG7-Y6g | 42:27 | 305M |
| DEF CON 29 - Tomer Bar, Eran Segal - 2021 Our Journey Back To The Future Of Windows Vulnerabilities | VxNi5pVDZU0 | 42:16 | 401M |
| DEF CON 29 - Vivek Nair - Time Turner Hacking RF Attendance Systems To Be in Two Places at Once | NdAIeXy2zoY | 22:02 | 336M |
| DEF CON 29 - Yuhao Weng, Steven Seeley, Zhiniang Peng - An Attack Surface Tour of SharePoint Server | mVXrl4W1jOU | 43:17 | 317M |
| DEF CON 29 - Zabrocki, Matrosov - Glitching RISC-V chips: MTVEC corruption for hardening ISA | iz_Y1lOtX08 | 52:45 | 744M |
| DEF CON 29 - Zhipeng Huo, Yuebin Sun, Chuanda Ding - Reveal and Exploit IPC Logic Bugs in Apple | oAMZxKsZQp0 | 40:02 | 214M |
| DEF CON 29 -Jiska, Alexander Heinrich - Wibbly Wobbly, Timey Wimey Whats Inside Apples U1 chip | k1H7fiVlTPA | 39:37 | 404M |
| DEF CON 29 -Joseph Gabay - DoS Denial of Shopping: Analyzing and Exploiting Shopping Cart Systems | LmSyb0kBvGE | 22:23 | 367M |
| DEF CON 29 -Justin Perdok - Hi Im DOMAIN Steve, Please Let Me Access VLAN2 | lDCoyxIhTN8 | 35:08 | 362M |
| DEF CON 29 Adversary Village - Abhijith B R - Village Kick Off | kdSFjjPZFpo | 08:53 | 143M |
| DEF CON 29 Adversary Village - Atul & Harshal - Tenacity An Adversary Emulation Tool for Persistence | J1liEq2R_rE | 29:13 | 271M |
| DEF CON 29 Adversary Village - Carlos Polop - New Generation of PEAS | 9_fJv_weLU0 | 30:25 | 450M |
| DEF CON 29 Adversary Village - Cheryl Biswas - Signed, Sealed, Delivered Comparing Chinese APTs | VAHBq2pKZGY | 44:44 | 339M |
| DEF CON 29 Adversary Village - Daniel Duggan - Designing a C2 Framework | 0Z3VadqyFiM | 46:51 | 464M |
| DEF CON 29 Adversary Village - Daniel Isler - How I got COVID in a RedTeam SE and Physical Intrusion | XhGfswtnzmY | 30:05 | 408M |
| DEF CON 29 Adversary Village - David Hunt - Prelude Operator | kzeKtqxk3cM | 29:36 | 410M |
| DEF CON 29 Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations | VorzjbpoQZc | 01:45:45 | 1G |
| DEF CON 29 Adversary Village - Gil Biton - Scaling Up Offensive Pipelines | EHEohd2iZRA | 37:01 | 498M |
| DEF CON 29 Adversary Village - Jonas Knudsen -Tool Demo: ImproHound Identify AD Tiering Violations | FRSVu0GBR3w | 26:34 | 267M |
| DEF CON 29 Adversary Village - Jose Garduno - C2Centipede APT level C2 communications for common rev | m6ygA5oPSQo | 47:53 | 650M |
| DEF CON 29 Adversary Village - Juneau Jones - Game Theory: Understanding and Strategy and Deception | OJb-omL2TtM | 25:00 | 178M |
| DEF CON 29 Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC Failures with RedELK | _7LJUjzdgiY | 45:41 | 701M |
| DEF CON 29 Adversary Village - Mark Loveless - A Short History and An Example Attack | XuNqM-0Ufx0 | 29:50 | 491M |
| DEF CON 29 Adversary Village - Matthew Eidelberg - Operation Bypass Catch My Payload If You Can | 69xsb_TeazA | 41:47 | 435M |
| DEF CON 29 Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation | yi1epKf0lcM | 38:22 | 468M |
| DEF CON 29 Adversary Village - Mauro Eldritch, Luis Ramirez - Everything is a C2 if you're brave | TWcBySQgfBE | 41:44 | 315M |
| DEF CON 29 Adversary Village - Phillip Wylie - The Way of The Adversary | q-C_Pjbrgec | 30:37 | 280M |
| DEF CON 29 Adversary Village - Samuel Kimmons - Intro to Adversary Emulation | c9uUwNPCIDY | 30:39 | 433M |
| DEF CON 29 Adversary Village - Sanne Maasakkers - Phish Like An APT | eJPx-Vr-U8E | 29:38 | 340M |
| DEF CON 29 Adversary Village - Sergey Chubarov - From OnPrem to the Cloud: Hybrid AD Attack Path | Hv2wZLb5Lsw | 34:21 | 298M |
| DEF CON 29 Adversary Village - Shantanu Khandelwal - Red Team Credentials Recon: OLD with a TWIST | BXD7ieT1V5k | 26:12 | 342M |
| DEF CON 29 Adversary Village - Stephan Wampouille - Autonomous Lateral Movement | 8Wlj0a_Kqw0 | 13:27 | 93M |
| DEF CON 29 Aerospace Village - Elizabeth Wharton - Lost In Space No one Can Hear Your Breach | f-CIRpSpRDY | 58:52 | 646M |
| DEF CON 29 Aerospace Village - Alex Lomas, Phil Eveleigh - Hacking Legacy IFEC in old 747s | uo9nwfbbTFI | 21:49 | 156M |
| DEF CON 29 Aerospace Village - Allan Tart - Holistic View of a Flight with Crowd Sourced Data | V0Vad2q6xUA | 25:46 | 122M |
| DEF CON 29 Aerospace Village - Brandon Bailey - Unboxing the Spacecraft Software BlackBox Hunting | NkAkL3odXks | 39:34 | 145M |
| DEF CON 29 Aerospace Village - Darren Cofer - Steal This Drone High Assurance Cyber Military Systems | X9rsv4YIShY | 24:38 | 79M |
| DEF CON 29 Aerospace Village - James Pavur - Threat Modeling for Space Hitchhikers | 7FH6mb7iwIQ | 25:27 | 86M |
| DEF CON 29 Aerospace Village - Jason Whelan - Defending the Unmanned Aerial Vehicle | GT-Fl4bKgXs | 25:44 | 94M |
| DEF CON 29 Aerospace Village - Joshua Smailes - CPDLC Man in the Middle Attacks | ONV7OsoRLM0 | 24:26 | 128M |
| DEF CON 29 Aerospace Village - Kevin Hood - Developing Aerospace Security 3D Training Models | Hlp8CQA5xJI | 19:23 | 63M |
| DEF CON 29 Aerospace Village - Leeloo Granger - Evaluating Wireless Attacks on Real World Avionics | Z-WYRI4cBY4 | 15:18 | 96M |
| DEF CON 29 Aerospace Village - Matt Gaffney - VDP in Aviation Experiences and Lessons Learnt | HH6EjTl7oJk | 30:14 | 157M |
| DEF CON 29 Aerospace Village - Nicholas Childs - Don’t fear the BUS, it won’t run you over | oiQ6_vWOxqE | 29:58 | 163M |
| DEF CON 29 Aerospace Village - Panel - Hack A Sat 2 The Good, The Bad and the Cyber Secure | kjmiPyVSuSI | 30:48 | 616M |
| DEF CON 29 Aerospace Village - Panel - True Story - Hackers in the Aerospace Sector | pG5hWEwqQjY | 27:37 | 250M |
| DEF CON 29 Aerospace Village - Pearce Barry - Collecting CANs a Bridge Less Travelled | opNmUR-889s | 27:57 | 61M |
| DEF CON 29 Aerospace Village - Ronald Brobert - Fuzzing NASA Core Flight System Software | YtExxB-ayo0 | 26:37 | 118M |
| DEF CON 29 Aerospace Village - Steve Luczynski, Larry Grossman - Federal Perspective on Aerospace | yeAFnhSnjIE | 30:00 | 246M |
| DEF CON 29 BIC Village - Keith Chapman - The Action Plan for Cyber Diversity | rjowVs_0XLc | 20:57 | 157M |
| DEF CON 29 BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in Tech | h7y3-9VST78 | 14:39 | 36M |
| DEF CON 29 BIC Village - Nico Smith - 40 Cores and A CPU | rd0LgoP9yo8 | 33:31 | 194M |
| DEF CON 29 BIC Village - Ochaun Marshall - The OPSEC of Protesting | QaIqN8cvVRE | 26:58 | 177M |
| DEF CON 29 Biohacking Village - Sounil Yu - Cyber Defense Matrix in Healthcare | 9ZecqDOxpp8 | 27:17 | 124M |
| DEF CON 29 Biohacking Village - Aaron Guzman - OWASP & CSA IoT Impacting Medical Security | 9m1lFlBYUGM | 39:14 | 108M |
| DEF CON 29 Biohacking Village - Alex Hoekstra - Open Source Vaccine Developer Kits VDKs | VKlH-em9XaA | 28:16 | 138M |
| DEF CON 29 Biohacking Village - Alex Pearlman - A Cohort of Pirate Ships | M0OWUcjv5v4 | 18:02 | 83M |
| DEF CON 29 Biohacking Village - Alissa Knight, Mitch Parker - Playing with FHIR | wrNyd60XPMg | 47:07 | 131M |
| DEF CON 29 Biohacking Village - Andrea Downing -No Aggregation Without Representation | _7eO0FoOk9M | 39:06 | 292M |
| DEF CON 29 Biohacking Village - Christian Dameff, Jeff Tully - The Future State of Healthcare | rRynLAr0Urk | 30:18 | 80M |
| DEF CON 29 Biohacking Village - Jennifer Goldsack, Jessilyn Dunn - The Digital Physiome | OXDz-ErBKKk | 48:54 | 274M |
| DEF CON 29 Biohacking Village - Lucia Savage, @BadHippa -A Talk with @BadHIPPA, | jREnTm2QeE4 | 42:08 | 415M |
| DEF CON 29 Biohacking Village - Mariam Elgabry - Internet of Ingestible Things Security by Design | aVOytk6ItjE | 13:11 | 78M |
| DEF CON 29 Biohacking Village - Matt McMahon, Shannon Lantzy - The Economics of Cybersecurity | KWMUHSYkZIc | 20:56 | 80M |
| DEF CON 29 Biohacking Village - Mixæl Laufer - The Little Things | L7cF98LtKbo | 25:44 | 410M |
| DEF CON 29 Biohacking Village - Nia Johnson - Reflections on Race, Health, and Equity | aS7hCyw9Q0Q | 45:58 | 506M |
| DEF CON 29 Biohacking Village - Ohad Zaidenberg - Fishing or Hunting | NcDtynphGA0 | 50:53 | 218M |
| DEF CON 29 Biohacking Village - Panel - Cloud security for Healthcare and Life Sciences | RtunCgVQoW4 | 01:03:22 | 337M |
| DEF CON 29 Biohacking Village - Pia Zaragoza, Joel Isaac -HC Innovation with People of All Abilities | dBxzye7iDP0 | 31:20 | 92M |
| DEF CON 29 Biohacking Village - RedDragon - Chinese Military Bioweapons and Intimidation Operations | 0M14yenB4TQ | 32:21 | 120M |
| DEF CON 29 Biohacking Village - Rob Suarez - Why you should join the Biohacking Village | F2l-5XkbWDs | 15:24 | 95M |
| DEF CON 29 Biohacking Village - Thom Dixon - Securing the Internet of Biological Things | rRtEiUJ-sH8 | 19:06 | 62M |
| DEF CON 29 Biohacking Village - Vee Schmitt, Ken Kato - Red vs Blue vs Green | YH_kdkoJKjw | 38:29 | 174M |
| DEF CON 29 Blockchain Village - Josh McIntyre - Subtle Ways to Lose Your Cryptocurrency | P7Y_jpsn7kQ | 40:12 | 179M |
| DEF CON 29 Blockchain Village - Anto Joseph - Flash Loans Demystified | lxTwFmGlM30 | 39:21 | 85M |
| DEF CON 29 Blockchain Village - Byeongcheol Yoo - Will Secure Element Strengthen Crypto Wallets | 0rdpLlh13V4 | 44:45 | 102M |
| DEF CON 29 Blockchain Village - Colin Cantrell - Scaling Blockchains A Novel Approach | LAxpGVkzIBI | 01:03:23 | 239M |
| DEF CON 29 Blockchain Village - Dabao Wong - Understanding Unlimited Approval in Ethereum | Ojbc_6_8JjA | 49:40 | 80M |
| DEF CON 29 Blockchain Village - Gokul Alex, Tejaswa Rastogi - Preventing Sandwich Attacks | pRq1B9mMdkE | 01:05:19 | 144M |
| DEF CON 29 Blockchain Village - Michael Lewellen - Ethereum Hacks & How to Stop Them | tyrGSQmJ-gk | 45:17 | 134M |
| DEF CON 29 Blockchain Village - Peter Kacherginsky - COSTA Coinbase Secure Trait Analyzer | zO0Y5ChlMXI | 25:15 | 63M |
| DEF CON 29 Blockchain Village - Reddcoin & TechAdept - CTF Contest | aoz3e_BClEI | 14:15 | 89M |
| DEF CON 29 Blockchain Village - Shinchul Park, Seungjoo Kim - Blockchain as a Threat Modeling Tool | eo1b1CohnD4 | 38:08 | 127M |
| DEF CON 29 Blockchain Village - Yaz Khoury - Surviving 51 Percent Attacks | wgv9TFP6M50 | 46:27 | 159M |
| DEF CON 29 Blue Team Village - Henry - How do you ALL THE CLOUDS | 96tgp9ht5Ag | 26:17 | 125M |
| DEF CON 29 Blue Team Village - Meisam Eslahi - Scope X Hunt in the Ocean | bDUZ5HuF634 | 29:56 | 192M |
| DEF CON 29 Blue Team Village - Ch33r10, Jorge Orchilles - BTV Presents Threat Report Roulette | 8viQbHQjJQM | 55:54 | 410M |
| DEF CON 29 Blue Team Village - Charles Rumford - Uncomfortable Networking | bMc2pvZMxAc | 30:35 | 100M |
| DEF CON 29 Blue Team Village - Drimacus - Leveraging NGFWs for Threat Hunting | WT5TCzzkINI | 23:30 | 114M |
| DEF CON 29 Blue Team Village - Gert-Jan Bruggink - This is what we thought would happen in 2021 | a3UtMuz_GSA | 28:05 | 283M |
| DEF CON 29 Blue Team Village - Igal Flegmann - I know who has access to my cloud, do you | yCv799Tgr8U | 10:27 | 54M |
| DEF CON 29 Blue Team Village - John Bambenek - Adventures in Pro Bono Digital Forensics Work | XEHHpb4wAwU | 51:55 | 252M |
| DEF CON 29 Blue Team Village - Karl Lovink, - Use DNS to detect domains abused for phishing | WtAS6i5Fp2M | 48:38 | 408M |
| DEF CON 29 Blue Team Village - Logjamming Tales of innovation, intrigue, & shenanigans | TFwHEfND8Xo | 36:14 | 400M |
| DEF CON 29 Blue Team Village - Mark Morowczynski - Modern Authentication for the Security Admin | gMjLC2PwKFo | 45:28 | 301M |
| DEF CON 29 Blue Team Village - Mike Cohen - Velociraptor Dig Deeper | TBWisjyP3zY | 34:37 | 229M |
| DEF CON 29 Blue Team Village - muteki - Year of Mentoring BTV’s Meet a Mentor Turns One | -6wG9oEPDu4 | 32:40 | 184M |
| DEF CON 29 Blue Team Village - Rabbit - Structured Analytical Techniques for Improving Info Sec | IAHjwop8BE0 | 32:17 | 184M |
| DEF CON 29 Blue Team Village - Renzon Cruz - Forensicating Endpoint Artifacts in Cloud Storage Svcs | fvCX7DP8rw4 | 32:24 | 206M |
| DEF CON 29 Blue Team Village - Sebastian Provost - Yeet the leet with Osquery | YJkkYLM5GXY | 47:32 | 173M |
| DEF CON 29 Blue Team Village - Wendy Edwards - What Machine Learning Can and Can't Do for Security | FfdnTJ0gVDs | 24:31 | 117M |
| DEF CON 29 Car Hacking Village - Ben Gardiner - Commercial Transportation Trucking Hacking | d7_vUB76NAI | 46:06 | 629M |
| DEF CON 29 Car Hacking Village - Samir Bhagwat - Fuzzing CAN CAN FD ECU's and Network | IMZ8DD4lTAY | 40:20 | 390M |
| DEF CON 29 Car Hacking Village - Ben Nassi -Remote Adversarial Phantom Attacks on Tesla, Mobileye | SZGz5jEW_YQ | 38:48 | 402M |
| DEF CON 29 Car Hacking Village - Bill Hatzer - From CTF to CVE | U4bmzbu436c | 36:03 | 356M |
| DEF CON 29 Car Hacking Village - Don Hatfield - Build Automotive Gateways with Ease | nHp9cNLBC8I | 36:01 | 325M |
| DEF CON 29 Car Hacking Village - Eric Gershman - Safety 3rd Defeating Chevy StabiliTrak | kBWg4I9795w | 23:09 | 243M |
| DEF CON 29 Car Hacking Village - Huajiang Chen, Wu Ming - Remotely Rooting Charging Stations | xxrcM_lTvbw | 26:01 | 227M |
| DEF CON 29 Car Hacking Village - Jay Turla - Bug Hunter's Guide to Bashing for Car Hacking Bug Bash | L7AwMhguR6s | 51:55 | 522M |
| DEF CON 29 Car Hacking Village - KEYNOTE - Ready, Fire Aim Hacking State and Federal Law Enforcement | 7pnwpF94WCM | 30:04 | 338M |
| DEF CON 29 Car Hacking Village - Lennert Wouters - Compromising the Tesla Model X keyless entry | ypQXtVQgxLo | 26:58 | 273M |
| DEF CON 29 Car Hacking Village - Nick Ashworth - Vehicle ID and Tracking via Passive Keyless Entry | b63CCwjYL4I | 50:43 | 490M |
| DEF CON 29 Cloud Village - Rodrigo Montoro - CSPM2CloudTrail Extending CSPM Tools | 7HPXHNB95iU | 20:13 | 34M |
| DEF CON 29 Cloud Village - Felipe Pr0teus - Hunting for AWS Exposed Resources | uLI24keCKFs | 26:31 | 66M |
| DEF CON 29 Cloud Village - Jayesh Singh Chauhan - Opening Note | eKkXNriy08w | 09:33 | 22M |
| DEF CON 29 Cloud Village - Alexandre Sieira - Attack Vectors for APIs w AWS API Gateway Lambda Auth | uovvDjfC9gg | 38:41 | 119M |
| DEF CON 29 Cloud Village - Batuhan Sancak - Azure Active Directory Hacking Wars | 97xrQ5KxGrg | 39:07 | 60M |
| DEF CON 29 Cloud Village - Cassandra Young - Exploiting the O365 Duo 2FA Misconfiguration | f2sThEAA7xs | 13:42 | 30M |
| DEF CON 29 Cloud Village - Daniel Prizmant - Windows Server Containers are Broken | tdX5l67BcDo | 35:13 | 85M |
| DEF CON 29 Cloud Village - Igal Flegmann - I know who has access to my cloud, do you | AY8RBt5J1mg | 21:53 | 85M |
| DEF CON 29 Cloud Village - Joshua - Understanding Google Cloud Misconfiguration Using GCP Goat | LL3rhzWcJAE | 38:24 | 100M |
| DEF CON 29 Cloud Village - Karl Fosaaen - Extracting all the Azure Passwords | OES9RU0WTH0 | 46:55 | 114M |
| DEF CON 29 Cloud Village - Kavisha Sheth - AWS Cloud Attack Vectors and Security Controls | P1nTUY77wjU | 39:37 | 84M |
| DEF CON 29 Cloud Village - Kevin Chen - PK WHY | Cou-3LC3L9g | 11:45 | 91M |
| DEF CON 29 Cloud Village - Madhu Akula - Kubernetes Goat Kubernetes Security Learning | xMy4ZkImE4k | 23:13 | 105M |
| DEF CON 29 Cloud Village - Magno Logan - Workshop Kubernetes Security 101 Best Practices | 9cnG22GwkDs | 02:30:01 | 460M |
| DEF CON 29 Cloud Village - Mazin Ahmed - Attack Vectors on Terraform Environments | 2mb12QDytP4 | 34:46 | 68M |
| DEF CON 29 Cloud Village - Michael Raggo - Identifying Toxic Combinations of Permissions | RjFOI-iQCno | 34:36 | 121M |
| DEF CON 29 Cloud Village - Mohammed Aldoub - Using Barq to Perform AWS Post-Exploitation | RJR8r56tpN0 | 21:00 | 110M |
| DEF CON 29 Cloud Village - Rami McCarthy - Cloud Security Orienteering | TysZX_tzU9I | 41:15 | 94M |
| DEF CON 29 Cloud Village - Rod Soto - Detection Challenges in Cloud Connected Credential Attacks | 6emlF2aQKw0 | 46:21 | 84M |
| DEF CON 29 Cloud Village - Wes Lambert - Onions In the Cloud Make the CISO Proud | ikQEgqt1q6s | 01:39:18 | 311M |
| DEF CON 29 Cloud Village - Yuval Avrahami - WhoC Peeking under the hood of CaaS offerings | GRswD4bdYN4 | 16:18 | 32M |
| DEF CON 29 Crypto and Privacy Village - Day 2 | 2tlXXuc2_H0 | 06:22:25 | 3G |
| DEF CON 29 Crypto and Privacy Village - Day 1 | MQtg0qg9VoM | 08:36:52 | 5G |
| DEF CON 29 Ham Radio Village - Bryan Fields - Spectrum Coordination for Amateur Radio | fH-yyTZffAk | 01:05:06 | 432M |
| DEF CON 29 Ham Radio Village - Eric Escobar - Getting started with low power⧸long distance Comms | jHTc7oGM2wk | 24:05 | 92M |
| DEF CON 29 Ham Radio Village - Gregg Horton - How to Contact the ISS with a $30 Radio | atw9a7J8u_k | 21:16 | 121M |
| DEF CON 29 Ham Radio Village - Jon Marler - Amateur Radio Digital Modes Primer | -btN8T6WvYg | 56:24 | 225M |
| DEF CON 29 Ham Radio Village - Kurtis Kopf - An Introduction to RF Test Equipment | Vo3tVjoYAFM | 01:13:56 | 3G |
| DEF CON 29 Ham Radio Village - Tyler Gardner - Amateur Radio Mesh Networking | 9opTlr5TPsA | 37:32 | 291M |
| DEF CON 29 HHV - rehr - Walkthrough of DC28 HHV Challenge Solutions | P-6XXUgvqng | 48:53 | 291M |
| DEF CON 29 HHV - Ben Gardiner - A Lazy Solve of @mediumrehr's HHV Challenge 6 | MZnnKl8xDTw | 36:18 | 426M |
| DEF CON 29 HHV - Bradan Lane - The PortaProg Project | rAvEzyzbecs | 39:52 | 392M |
| DEF CON 29 HHV - Federico Lucifredi - Hardware Hacking 101 Rogue Keyboards and Spy Cables | sgwJ_oohjRU | 50:15 | 357M |
| DEF CON 29 HHV - Gigs - The Black Box and the Brain Box When Electronics and Deception Collide | dKjVh-XUeYc | 17:03 | 153M |
| DEF CON 29 ICS Village - Aaron Boyd - Living off the Land in an ICS OT Penetration Test | DLKpsjtVvlc | 25:13 | 103M |
| DEF CON 29 ICS Village - Dan Gunter - Consider the Data Source | QhFNcGuFRzM | 49:30 | 168M |
| DEF CON 29 ICS Village - Dieter Sarrazyn - Fortifying ICS Hardening and Testing | pujzX8vkkMU | 25:10 | 85M |
| DEF CON 29 ICS Village - Don C Weber - Scripts and Tools to Help Your ICS InfoSec Journey | WxIn7fy4LK4 | 24:43 | 154M |
| DEF CON 29 ICS Village - Hash Saehi - Smart Meters I'm Hacking Infrastructure and So Should You | fKnSU1eB_74 | 22:07 | 359M |
| DEF CON 29 ICS Village - ICS Village Opening and Introduction | QL_sZvwS7-w | 02:48 | 11M |
| DEF CON 29 ICS Village - Javier Perez, Juan Escobar - ICS Intrusion KillChain Explained | be8qnq93dZc | 28:44 | 202M |
| DEF CON 29 ICS Village - Joe Slowik - Crippling the Grid Examination of Dependencies & Cyber Vulns | MwsOCLtzH0A | 22:05 | 47M |
| DEF CON 29 ICS Village - John Ellis, Julia Atkinson - Attract, Develop, & Retain ICS Workforce | PUM4ZnmMtBM | 12:47 | 45M |
| DEF CON 29 ICS Village - Lauren Zabierek - Collaborative Cyber Defense & Enhanced Threat Intel | DixZG7HCTt8 | 28:38 | 293M |
| DEF CON 29 ICS Village - Mary Brooks - ICS Jeopardy | 2h2RmcjUY3M | 43:57 | 168M |
| DEF CON 29 ICS Village - Meet Can Kilic - Do We Really Want to Live in the Cyberpunk World | qbXpGfAsObY | 24:31 | 161M |
| DEF CON 29 ICS Village - Nico Leidecker, Moritz Thomas - Building ICS Firing Range in Our Kitchen | 3C2iRzecnWI | 27:18 | 180M |
| DEF CON 29 ICS Village - Otis Alexander - Highlighting the Importance of Detection Context | gR9EFvdSYqQ | 22:05 | 75M |
| DEF CON 29 ICS Village - Panel - Protecting Critical Infrastructure from Ransomware | XenfD667Flg | 54:49 | 631M |
| DEF CON 29 ICS Village - Panel - ICS CTI Information Sharing Between Brazil and the United States | UAbn3y4SX8M | 31:40 | 299M |
| DEF CON 29 ICS Village - Panel - Students Performing ICS Security Assessments | _5rDpbX0gnc | 24:08 | 226M |
| DEF CON 29 ICS Village - PW Singer - Keynote Reading the Future with Useful Fiction | dHdkDINfpW0 | 29:21 | 226M |
| DEF CON 29 ICS Village - Sara Fluchs, Vivek Ponnada - Top 20 Secure PLC Coding Practices | 5y0cq732zqk | 46:09 | 208M |
| DEF CON 29 ICS Village - Seth Grove - Network Traffic Analysis with Malcolm | JYpkbPVnatA | 01:37:06 | 661M |
| DEF CON 29 ICS Village - Sharon Brizinov, Uri Katz - Down Exploiting Vulnerabilities In the OT Cloud | COhXUjtCVMU | 30:01 | 86M |
| DEF CON 29 ICS Village - Stefan Stephenson-Moe - Detecting Attackers with State Estimation | _geVHVHUtFI | 27:18 | 219M |
| DEF CON 29 ICS Village - Thomas Pace - Leveraging SBOMs to Enhance ICS Security | y-1MWtgGb4w | 28:32 | 148M |
| DEF CON 29 ICS Village - Tim Yardley - Beetlejuice The Lessons We Should Have Learned | ZaxjEmonLUA | 25:44 | 126M |
| DEF CON 29 Payment Village - Vahagn Vardanyan - Racing Cryptoexchanges | FHnYo_BjNew | 12:46 | 21M |
| DEF CON 29 Payment Village - Hector Cuevas Cruz - ATM Transaction Reversal Frauds | 7m0C8n8ZMDo | 41:05 | 179M |
| DEF CON 29 Payment Village - Meadow Ellis - Automated Tear Machines | lNnxb5mnwyk | 40:36 | 766M |
| DEF CON 29 Payment Village - Timur Yunusov - When businesses decide to enrol cryptocurrency cards | 9ZaHuV4erUE | 19:08 | 39M |
| DEF CON 29 Recon Village - Kala Kinyon - OSINT for Sex Workers | Nj-FqBapY2o | 23:02 | 103M |
| DEF CON 29 Recon Village - Rae - Using OSINT to Aid in Human Trafficking and Smuggling Cases | -cBNQGzVDeM | 30:17 | 185M |
| DEF CON 29 Recon Village - Ritu Gil - So You Want to OPSEC, Eh | daXNSvb_S3w | 23:10 | 87M |
| DEF CON 29 Recon Village - Andy Dennis - Using Passive DNS for gathering Business Intelligence | 7egAj-8juK0 | 29:45 | 113M |
| DEF CON 29 Recon Village - Anthony Kava - GOV Doppelgänger Your Häx Dollars at Work | _Mo6U7_B7gs | 29:51 | 222M |
| DEF CON 29 Recon Village - Ben S - Future of Asset Management | pvk4iOLKbaw | 41:07 | 451M |
| DEF CON 29 Recon Village - Ladislav Baco - How Vigilant Researchers Can Uncover APT Attacks | 6PoroGGBt8E | 29:15 | 117M |
| DEF CON 29 Recon Village - Manabu Niseki - Adversary Infrastructure Tracking with Mihari | 6bBmxsihyRA | 20:46 | 96M |
| DEF CON 29 Recon Village - MasterChen - Can I Make My Own Social Threat Score | Cc-Y6TmTCHM | 29:01 | 145M |
| DEF CON 29 Recon Village - Mauro Eldritch - Venator Hunting & Smashing Trolls on Twitter | JaDvfAAzbhw | 47:03 | 275M |
| DEF CON 29 Recon Village - Mishaal Khan - People Hunting A Pentesters Perspective | v7GWqQLoWvc | 28:14 | 297M |
| DEF CON 29 Recon Village - Nick Roy - OSINT and the Hermit Kingdom | HLzv8TVMQHo | 42:01 | 226M |
| DEF CON 29 Recon Village - Ryan Elkins - How to Build Cloud Based Recon Automation at Scale | i2ouX0js9n8 | 45:16 | 214M |
| DEF CON 29 Recon Village - Tushar Verma - The Bug Hunter’s Recon Methodology | YKFG4IAaTRo | 15:38 | 55M |
| DEF CON 29 Recon Village - Utku Sen - Finding Hidden Gems via URL Shortener Services | BlcORtyfKWk | 19:16 | 141M |
| DEF CON 29 Red Team Village - A discussion about the Red Team Village CyberWraith | HmYb9F-Npdw | 38:05 | 381M |
| DEF CON 29 Red Team Village - CTF Day 2 | aYbkzPSNT5E | 04:40:56 | 2G |
| DEF CON 29 Red Team Village - Custom Mechanical Keyboard Build | LhAenkBXBjM | 01:23:17 | 1G |
| DEF CON 29 Red Team Village - Bruce Schneier - AI and Red Team Village Panel | t1w8-_AHCGs | 01:36:29 | 917M |
| DEF CON 29 Red Team Village - CTF Day 1 | ccLKzqBLmAg | 00:50 | 10M |
| DEF CON 29 Red Team Village - CTF Day 3 | EpeO_wJ0JCI | 02:54:15 | 944M |
| DEF CON 29 Red Team Village - CTF Recap and Upcoming Events | 3vZjOtFyUY0 | 25:37 | 263M |
| DEF CON 29 Red Team Village - Panel - The future of AI, Machine Learning, and Offensive Security | gv0yMVFwCM4 | 01:00:14 | 787M |
| DEF CON 29 Red Team Village - Russ Hanneman - Message about the Red Team Village CTF | cwrlwetRz8k | 00:39 | 12M |
| DEF CON 29 Voting Village - Brianna Lennon and Eric Fey - High Turnout, Wide Margins | OYCPQ7mUt6Y | 25:54 | 60M |
| DEF CON 29 Voting Village - Barb Byrum - Hack the Conspiracies | gVC9zjZ6KnI | 26:52 | 108M |
| DEF CON 29 Voting Village - BiaSciLab - Secrets of Social Media PsyOps | kvPdQj-ikvA | 26:52 | 111M |
| DEF CON 29 Voting Village - Bob Sullivan - A Journalist’s Perspective on Fake News | p5gqmtTBe54 | 10:40 | 66M |
| DEF CON 29 Voting Village - Carsten Schürmann - How to Weaponize RLAs to Discredit an Election | TxXMRWTpZlY | 31:09 | 165M |
| DEF CON 29 Voting Village - Commissioner Thomas Hicks, EAC - Keynote Remarks | ctO-86QxBto | 19:33 | 159M |
| DEF CON 29 Voting Village - Harri Hursti - Welcome Remarks | Abo24w-CYR8 | 25:24 | 101M |
| DEF CON 29 Voting Village - Harri Hursti - NH SB43 Forensic Audit | xwlYmcUjB8k | 48:18 | 296M |
| DEF CON 29 Voting Village - Kevin Skoglund - Are Barcodes on Ballots Bad | rO_OAcZYDQM | 29:56 | 53M |
| DEF CON 29 Voting Village - Maurice Turner - Why Hacking Voters Is Easier Than Hacking Ballots | 5_pj8ZyixQ8 | 28:33 | 326M |
| DEF CON 29 Voting Village - Sang Oun Lee - Keeping Your Information Security Policy Up to Date | wNu4wAAQY-8 | 24:28 | 140M |
| DEF CON 29 Voting Village - Sebastian Bay - Social Media Security = Election Security | OWY9EC6jaNg | 20:51 | 62M |
| DEF CON 29 Voting Village - Susan Greenhalgh - Wireless Odyssey | GAt0-ZedlVY | 25:00 | 122M |
| DEF CON 29 Voting Village - Tod Beardsley - A Deep Dive on Vulnerability Disclosure | cP3HuNsIi4g | 27:06 | 104M |
| DEF CON 29- Dennis Giese - Robots with lasers and cameras but no security Liberating your vacuum | EWqFxQpRbv8 | 33:34 | 123M |
| DEF CON 3 3 - Exploiting Vulns in EV Charging Comms - Jan Berens, Marcell Szakály, Sebastian Köhler | kQVszh5ER1M | 55:11 | 233M |
| DEF CON 30 - Crypto and Privacy interview with Silk | lyY3bO1knSY | 04:07 | 126M |
| DEF CON 30 - ICS Village Interview | mY7D1Kb-LIs | 05:38 | 116M |
| DEF CON 30 - Jake Labelle - Doing the Impossible - How I Found Mainframe Buffer Overflows | Mkfk2UcmA-8 | 38:52 | 223M |
| DEF CON 30 - Jeffrey Hofmann - PreAuth RCE Chains on an MDM - KACE SMA | vPVtC7VHEmU | 35:58 | 228M |
| DEF CON 30 - LiveCTF - Day 3 | G5R912yhHGs | 03:51:05 | 2G |
| DEF CON 30 - Martin Doyhenard - Internet Server Error - Exploiting Interprocess Communication | pLosVyt8L9Q | 48:26 | 429M |
| DEF CON 30 - Melvin Langvik - Taking a Dump In The Cloud | 27fv-maYVm0 | 40:11 | 636M |
| DEF CON 30 - Misinformation Village Interview | DhaIKxOpjxo | 02:15 | 18M |
| DEF CON 30 - Nick Powers, Steven Flores – ClickOnce AbUse for Trusted Code Execution | cyHxoKvD8Ck | 44:24 | 675M |
| DEF CON 30 - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs | pNNOUiR8EQo | 22:22 | 451M |
| DEF CON 30 - Thomas Roth , Solana - JIT - Lessons from fuzzing a smart contract compiler | 8E7XOHQiRPE | 31:49 | 183M |
| DEF CON 30 - Arik Atar - Top performing account crackers business modules, architecture, technique | RUjofATOhFk | 44:57 | 610M |
| DEF CON 30 - Asaf Gilboa, Ron Ben-Yitzhak - Abusing Windows Error Reporting to Dump LSASS | -QRr_8pvOiY | 27:02 | 363M |
| DEF CON 30 - Aviv Sassoon -The Journey From Isolated Container to Cluster Admin | K3auibuYf4E | 35:40 | 495M |
| DEF CON 30 - Dagan Henderson, Will Kline - The Call is Coming From Inside The Cluster | 0pN-x1q-PZs | 37:33 | 441M |
| DEF CON 30 - RECON VILLAGE CTF | hcjMOkTCn1M | 01:15 | 33M |
| DEF CON 30 - A Random Walk around DEF CON | s3Dy5lDLb18 | 02:08 | 23M |
| DEF CON 30 - Aaditya Purani, Max Garrett - ElectroVolt - Pwning Popular Desktop Apps | Olq6XnZ4Pwo | 44:47 | 333M |
| DEF CON 30 - Aerospace Badge | BU2_aLkopXo | 05:37 | 115M |
| DEF CON 30 - Aerospace Village Interview | U-I_SxVCmKE | 01:47 | 14M |
| DEF CON 30 - After Hours Vol. 1 - The Deluge | 6ilyMyCJTB0 | 01:41 | 32M |
| DEF CON 30 - Andrew Logan - Tracking Military Ghost Helicopters over Washington DC | KYuBf2HpXJg | 18:52 | 52M |
| DEF CON 30 - App Sec Village Interview | ZS2cemvD00U | 01:00 | 10M |
| DEF CON 30 - Aviv Sasson - The Journey From an Isolated Container to Cluster Admin in Service Fabric | MX4S74AlLug | 43:16 | 695M |
| DEF CON 30 - Behind the CTF | wiPhvC_2oY0 | 03:29 | 59M |
| DEF CON 30 - Ben Barnea, Ophir Harpaz - Exploring Ancient Ruins to Find Modern Bugs | lDvNKHGPsJg | 45:26 | 294M |
| DEF CON 30 - Ben Gardiner - Trailer Shouting - Talking PLC4TRUCKS Remotely with an SDR | Na8K_fVEzQo | 43:49 | 486M |
| DEF CON 30 - Bill Graydon - Defeating Moving Elements in High Security Keys | 3OmyVJDjTr4 | 45:45 | 916M |
| DEF CON 30 - Blacks in CyberSecurity Village Interview | WrvuvW1b8gw | 04:07 | 108M |
| DEF CON 30 - Blue Team Village | qA_LggJz5vI | 04:38 | 81M |
| DEF CON 30 - Blue Team Village Interview | ZyC4_R4qtYs | 09:11 | 240M |
| DEF CON 30 - Car Hacking Village Interview | i-qhx2-dyyk | 04:38 | 127M |
| DEF CON 30 - Car Hacking Village vol. 1 | V83A3qNV9Io | 03:22 | 76M |
| DEF CON 30 - Cesare Pizzi - Old Malware, New tools: Ghidra and Commodore 64 | Dl7l7gdr34o | 46:22 | 961M |
| DEF CON 30 - Chris Inglis, Kim Zetter - A Policy Fireside Chat with the National Cyber Director | xWY0Yw8a7fM | 44:17 | 819M |
| DEF CON 30 - Closing Ceremonies and Awards | -354i0Sl8tA | 02:06:21 | 1G |
| DEF CON 30 - Cloud Village | YX6NtLXdbRA | 02:55 | 74M |
| DEF CON 30 - Cloud Village interview | 8MYOOj7LpLU | 03:54 | 81M |
| DEF CON 30 - ColdwaterQ - Backdooring Pickles: A decade only made things worse | lECEXFtVjig | 19:30 | 265M |
| DEF CON 30 - Contests Closing Ceremonies and Awards | YN1MNQWFTTc | 58:49 | 709M |
| DEF CON 30 - Cory Doctorow, Christian Dameff, Jeff Tully - Why Patients Should Hack Med Tech | _i1BF5YGS0w | 43:34 | 286M |
| DEF CON 30 - Crypto and Privacy Village | o0ms3NrCpNw | 03:15 | 69M |
| DEF CON 30 - Daniel Jensen - Hunting Bugs in the Tropics | kMgXtuJdP3c | 43:22 | 541M |
| DEF CON 30 - DEF CON After Hours Vol 2 | QP1pznODlSs | 02:00 | 23M |
| DEF CON 30 - DEF CON CTF | -S70ZdApfwU | 24:36 | 328M |
| DEF CON 30 - DEF CON Music | cBTz0aiDYaQ | 02:03 | 17M |
| DEF CON 30 - DEF CON Policy Dept - What is it, what are we trying to do for hackers in PolicyWorld? | QuG4hqmPTMw | 59:46 | 831M |
| DEF CON 30 - DEF CON X Hak5 collab! | 1sI_NkAimmE | 29:30 | 1G |
| DEF CON 30 - Demo Labs | da5TFN8rR5E | 04:54 | 111M |
| DEF CON 30 - Eran Segal - The COW Container On Windows Who Escaped the Silo | Xte4IKnRqao | 38:29 | 339M |
| DEF CON 30 - Eugene Lim- You Have 1 New Appwntment - Hacking Proprietary iCalendar Properties | 2q-E2AKUxJ4 | 33:39 | 274M |
| DEF CON 30 - Gal Zror - Hacking ISPs with Point-to-Pwn Protocol over Ethernet (PPPoE) | Uwwg4gKpy-M | 39:18 | 208M |
| DEF CON 30 - Gamer Hat | MOM87FWMrMY | 00:57 | 33M |
| DEF CON 30 - Girls Hack Village Interview | mTnclPn-diQ | 02:57 | 16M |
| DEF CON 30 - Hadrien Barral - Emoji Shellcoding: 🛠️, 🧌, and 🤯 | E8puAkalMRQ | 43:29 | 415M |
| DEF CON 30 - Ham Radio Village Interview 2 | 2IGEhg1bptE | 06:03 | 189M |
| DEF CON 30 - Hardware Hacking Village Interview | TJn07pY_UwU | 08:54 | 268M |
| DEF CON 30 - Harley Geiger, Leonard Bailey - Hacking Law is for Hackers | duz7UXxR7tc | 01:27:39 | 853M |
| DEF CON 30 - Ionut Cernica - Deanonymization of TOR HTTP Hidden Services | v45_tkKCJ54 | 18:12 | 198M |
| DEF CON 30 - Jen Easterly - Walk This Way: What Run DMC & Aerosmith Can Teach On Future of Cybersec | OFDuhi7VClQ | 55:01 | 489M |
| DEF CON 30 - Jonathan Leitschuh - Scaling the Security Researcher to Eliminate OSS Vulnerabilities | UgGhEfdUSvQ | 44:20 | 293M |
| DEF CON 30 - Jose Pico, Fernando Perera - Wireless Keystroke Injection via Bluetooth Low Energy | _gBwmN325GU | 37:06 | 268M |
| DEF CON 30 - Joseph Ravichandran - The PACMAN Attack: Breaking PAC on Apple M1 with Hardware Attacks | WRNZhP4CVgE | 37:28 | 734M |
| DEF CON 30 - Kenneth Geers - Computer Hacks in the Russia-Ukraine War | y9cIiL-2IWc | 20:54 | 115M |
| DEF CON 30 - Lennert Wouters - A Black-Box Security Evaluation of SpaceX Starlink User Terminal | myKs04lfuy8 | 35:48 | 565M |
| DEF CON 30 - LiveCTF - Day 2 | AJnPlFh_etI | 09:56:25 | 5G |
| DEF CON 30 - LiveCTF - Day 1 Part One | 1-J9rWFA8gg | 05:08:39 | 3G |
| DEF CON 30 - Lockpick Village Interview | PGfaBQ9sRm4 | 03:45 | 19M |
| DEF CON 30 - Miana E Windall, Micsen - Digital Skeleton Keys | G2EE_yA7OyI | 19:54 | 153M |
| DEF CON 30 - Michael Bargury - Low Code High Risk - Enterprise Domination via Low Code Abuse | D3A62Rzozq4 | 40:08 | 349M |
| DEF CON 30 - Michael Bargury - No-Code Malware - Windows 11 at Your Service | e8PEIOa6W9M | 32:13 | 386M |
| DEF CON 30 - Minh Duong - The Big Rick - How I Rickrolled My High School District, Got Away With It | 3PAauAy-Fb4 | 20:49 | 298M |
| DEF CON 30 - MKFactor Badge talk | A6bFMqx2LpU | 14:20 | 247M |
| DEF CON 30 - Moritz Abrell - Phreaking 2.0 - Abusing Microsoft Teams Direct Routing | LXxcVi2MMe8 | 20:49 | 139M |
| DEF CON 30 - Octavio Gianatiempo, Octavio Galland - Hidden Attack Surface of OEM IoT devices | veicfLvqcOs | 39:15 | 276M |
| DEF CON 30 - Omri Misgav - Running Rootkits Like A Nation-State Hacker | xwMXDo0YDro | 23:45 | 177M |
| DEF CON 30 - Packet Hacking Village Interview | slsw68EnsH8 | 00:59 | 3M |
| DEF CON 30 - Panel - Emerging Technical Cyber Policy Topics | Z_PbYH88d3k | 01:17:52 | 947M |
| DEF CON 30 - Panel - Moving Regulation Upstream - Focus on the Role of Digital Service Providers | xquZHy2ipGY | 01:55:01 | 1G |
| DEF CON 30 - Patrick Wardle, Tom McGuire - Deja Vu - Uncovering Stolen Algorithms in Commercial Prod | _Alvk_Fmqc8 | 20:56 | 319M |
| DEF CON 30 - Paul Roberts - Brazil Redux - Short Circuiting Tech-Enabled Dystopia Right to Repair | X27Sw7r6gB8 | 01:16:34 | 1G |
| DEF CON 30 - Perimeter Breached! Hacking an access control system - Sam Quinn Steve Povolny | MGcSj5BKIz8 | 02:30 | 70M |
| DEF CON 30 - Physical Security Village Interview | 8NL--ilPm5A | 06:15 | 209M |
| DEF CON 30 - Red Team Village interview | X-vgG5zAd9M | 03:26 | 34M |
| DEF CON 30 - RedAlert ICS CTF | K-AWssR7OWA | 06:24 | 167M |
| DEF CON 30 - Rogues Village Interview | 4wbjzXwMBc0 | 05:54 | 125M |
| DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor | 01oeaBb85Xc | 48:29 | 146M |
| DEF CON 30 - Sam Quinn, Steve Povolny - Perimeter Breached Hacking an Access Control System | 2htQvpvFex4 | 43:10 | 208M |
| DEF CON 30 - Samuel Erb, Justin Gardner - Crossing the KASM - a Webapp Pentest Story | NwMY1umhpgg | 32:07 | 465M |
| DEF CON 30 - Scavenger Hunt - Flamethrower | OdiSma-BDGQ | 01:27 | 37M |
| DEF CON 30 - Scavenger Hunt | W_h45WRHFYk | 01:26 | 48M |
| DEF CON 30 - Sick Codes - Hacking the Farm = Breaking Badly into Agricultural Devices | z2_TLz9TpwY | 47:59 | 234M |
| DEF CON 30 - Silk - Open Research Institute | wxmMrwFVc4g | 06:13 | 155M |
| DEF CON 30 - Silk - BlacksinCyber Village Interview | go4kkRIwjQ8 | 02:15 | 52M |
| DEF CON 30 - Silk - Car Hacking Team | VwmKnlLKmBM | 05:19 | 95M |
| DEF CON 30 - Silk - Darknet Team Chat | LvvhvhqDV9k | 03:38 | 88M |
| DEF CON 30 - Silk - DEF CON Memorial Interview | Pv33I_GXOGA | 12:35 | 223M |
| DEF CON 30 - Silk - Hack Fortress | cINgbB4IeQU | 06:13 | 148M |
| DEF CON 30 - Silk - Hacker Karaoke | CGoM35pojcU | 04:16 | 50M |
| DEF CON 30 - Silk - How to Lock Pick | TmyRF_bcddI | 21:34 | 426M |
| DEF CON 30 - Silk - nuucsoda | bRTS-NTT7iQ | 12:46 | 297M |
| DEF CON 30 - Silk - Plane Hacking | 6DHi-qC1jww | 16:39 | 444M |
| DEF CON 30 - Silk - XOR Machine | 7Ds8M38GqP8 | 02:59 | 87M |
| DEF CON 30 - Silk vs. the NOC | 3HH1UibUBC4 | 04:40 | 121M |
| DEF CON 30 - Silk- GoKarts | zf4oHEqAHQA | 04:05 | 131M |
| DEF CON 30 - Slava Makkaveev - Digging into Xiaomis TEE to to Get to Chinese Money | huAJpikYBdk | 23:17 | 321M |
| DEF CON 30 - stacksmashing - The Hitchhacker’s Guide to iPhone Lightning and JTAG Hacking | 8p3Oi4DL0eI | 20:13 | 152M |
| DEF CON 30 - Stewart Scott, Trey Herr - Dragon Tails: Supply-side Security& Intl Vuln Disclosure Law | uYTbxNtZ1z4 | 15:43 | 82M |
| DEF CON 30 - Tamper Evident Village | slhdowWjSuU | 08:23 | 184M |
| DEF CON 30 - Tarek Abdelmotaleb, Dr. Bramwell Brizendine - Weaponizing Windows Syscalls | ME7IGHPcSKw | 25:43 | 780K |
| DEF CON 30 - The Dark Tangent and MK Factor - Welcome to DEF CON and The Making of the DEF CON Badge | 4Llav8BceRo | 41:17 | 421M |
| DEF CON 30 - Thijs Alkemade - Process injection: breaking all macOS security layers w⧸a single vuln | fjTvgPM0Tf0 | 39:19 | 519M |
| DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly of APT’s operations security | StSLxFbVz0M | 46:01 | 926M |
| DEF CON 30 - Tristan Miller - Reversing the Original Xbox Live Protocols | HLyZfZMu-5E | 49:45 | 347M |
| DEF CON 30 - Violin Ninja | r63ycQyA0cg | 03:36 | 83M |
| DEF CON 30 - Voting Machine Village interview | BfmXTxf_4Xo | 01:52 | 13M |
| DEF CON 30 - Voting Machine Village Interview | yL3yYk2UOEo | 09:54 | 244M |
| DEF CON 30 - Wietze Beukema - Save Environment Variable - Hijacking Legit Apps w Minimal Footprint | LxjnI5h_kls | 41:52 | 314M |
| DEF CON 30 - Zachary Minneker - How To Get MUMPS Thirty Years Later - Hacking the Govt w FOIAd Code | nSbN7p39SrA | 42:54 | 741M |
| DEF CON 30 BiC Village - Alexis Hancock - The Man in the Middle | bIXFWZuMHr4 | 29:57 | 98M |
| DEF CON 30 BiC Village - Birhanu Eshete - State of the Model | 7bKGljbnJQI | 59:23 | 250M |
| DEF CON 30 BiC Village - Damian Grant - DEI in Cybersecurity Breaking through the barrier | 9pv3dqbTz4w | 20:07 | 56M |
| DEF CON 30 BiC Village - Kassandra Pierre, Nathan Chung - Neurodiversity in Cybersecurity | Xf2p0k8woGs | 46:12 | 226M |
| DEF CON 30 BiC Village - Ochuan Marshall - The Last Log4J Talk You Ever Need | qGDpBCEKvlQ | 43:47 | 391M |
| DEF CON 30 BiC Village - Segun Olaniyan- Growth Systems for Cybersecurity Enthusiasts | s-iLGZQTYaM | 59:43 | 181M |
| DEF CON 30 BiC Village - Stephanie Barnes - A Bridge Across the Digital Divide | dRL9NtegG6M | 35:27 | 211M |
| DEF CON 30 Blue Team Village - Anton Ovrutsky - Hunting Malicious Office Macros | lrcAl_WD0HY | 29:23 | 188M |
| DEF CON 30 Blue Team Village - Connor Morley - Malicious memory techniques on Windows & how to spot | 2Xw-wUWGWg8 | 59:34 | 357M |
| DEF CON 30 Blue Team Village - Filipi Pires - Malware Hunting Discovering techniques in PDF | AGr25lmSflk | 51:38 | 350M |
| DEF CON 30 Blue Team Village - Gilmar Esteves, Filipi Peres - Horusec Brazilian SAST help World | r6Q3zhqoboE | 21:11 | 199M |
| DEF CON 30 Blue Team Village - Mark Morowczynski - Security posture of MacOS and Linux Azure AD | PnXG6IT3zyA | 01:04:40 | 382M |
| DEF CON 30 Blue Team Village - Matt Scheurer - Lend me your IR's | mfkZZXTsBII | 58:32 | 414M |
| DEF CON 30 Blue Team Village - Meisam Eslahi - Threat Hunt Trilogy A Beast in the Shadow | Aqk9SGPbI3c | 54:53 | 476M |
| DEF CON 30 Blue Team Village - Project Obsidian - IR Final Reporting Made Exciting | RtuKU9SNFGg | 30:05 | 169M |
| DEF CON 30 Blue Team Village - Project Obsidian - Kill Chain 3 Endpoint Forensics Walkthrough | t2h-Mz27iSI | 29:16 | 294M |
| DEF CON 30 Blue Team Village - Project Obsidian - Mise En Place for Investigations | 47L9tS0eORE | 46:14 | 290M |
| DEF CON 30 Blue Team Village - Project Obsidian - Using Chainsaw to Identify Malicious Activity | d4YfkoqCV_s | 21:29 | 246M |
| DEF CON 30 Blue Team Village - Project Obsidian - Creating a Custom Velociraptor Collector | 9CB5NmXghek | 17:56 | 104M |
| DEF CON 30 Blue Team Village - Project Obsidian - CTH Hunting for Adversary's Schedule | fn-Nd5MtUEA | 49:34 | 416M |
| DEF CON 30 Blue Team Village - Project Obsidian - CTH Sniffing Compromise Hunting for Bloodhound | 1oco6TSaVRo | 41:07 | 330M |
| DEF CON 30 Blue Team Village - Project Obsidian - CTH The Logs are Gone | YN0dbIzWQNM | 36:27 | 161M |
| DEF CON 30 Blue Team Village - Project Obsidian - CTI Generating Threat Intelligence from Incident | cYqToDl_W2A | 30:53 | 158M |
| DEF CON 30 Blue Team Village - Project Obsidian - IR It all starts here, scoping the incident | 6R5BsxG_zSM | 38:21 | 193M |
| DEF CON 30 Blue Team Village - Project Obsidian - IR OODA An hour in incident responder life | yn9DmRMo_so | 34:05 | 164M |
| DEF CON 30 Blue Team Village - Project Obsidian - REM Phishing In The Morning - Abundance of Samples | M6B88CZxViE | 35:51 | 300M |
| DEF CON 30 Blue Team Village - Sarthak Tankja - Even my Dad is a Threat Modeler | r4bdnuN84J0 | 23:23 | 139M |
| DEF CON 30 Blue Team Village - Saurabh Chaudhary - YARA Rules to Rule them All | -upNhwmNGp8 | 17:28 | 75M |
| DEF CON 30 Blue Team Village -Project Obsidian - REM Long Walks On The Beach Analyzing PowerShells | G-7XB2333hE | 43:28 | 267M |
| DEF CON 30 Blue Team Village -Project Obsidian - The Importance of Sysmon for Investigations | 2And6u5yxLw | 20:42 | 143M |
| DEF CON 30 Blue Team Village- Project Obsidian - CTH Go Phish Visualizing Basic Malice | Pln9ZYafKyE | 41:05 | 237M |
| DEF CON 30 Car Hacking Village - Ayyapan Rajesh - Security like the 80s How I stole your RF | g4SxSTqv-Bk | 39:40 | 74M |
| DEF CON 30 Car Hacking Village - David Rogers - Integrating Mileage Clocking Into a Simulator Rig | 9q2rHkiPwLk | 45:00 | 531M |
| DEF CON 30 Car Hacking Village - Evadsnibor - Getting Naughty on CAN bus with CHV Badge | ItPVA3x77EQ | 01:04:36 | 648M |
| DEF CON 30 Car Hacking Village - Jay Turla - canTot A CAN Bus Hacking Framework | OBC0v5KDcJg | 30:00 | 295M |
| DEF CON 30 Car Hacking Village - Kamel - RFCommotion Invisible Serial Ports Flying Through the Air | X59D3OangiM | 45:00 | 428M |
| DEF CON 30 Car Hacking Village - Kartheek Lade - CANalyse 2.0 Vehicle Network Analysis & Attack Tool | y0rGBc2jy74 | 50:00 | 91M |
| DEF CON 30 Car Hacking Village - Kevin2600, Li Swei - Biometrics System Hacking of the Smart Vehicle | _mPW_iul97M | 40:00 | 521M |
| DEF CON 30 Car Hacking Village - Mohammed Shine - Remote Exploitation of Honda Cars | BKzkZPz3n_c | 30:00 | 276M |
| DEF CON 30 Car Hacking Village - Soohwan Oh, Jonghyuk Song, Jeongho Yang - Smart Black Box Fuzzing | C1_ZIXZVIBg | 30:00 | 247M |
| DEF CON 30 ICS Village SEAtf Competition | UsPFuBt_GOY | 05:48 | 72M |
| DEF CON 30 ICS Village - Fast Forward | b1VcOqaYs7c | 01:31 | 43M |
| DEF CON 30 ICS Village - SEAtf Setup | douawM9UqHc | 01:14 | 17M |
| DEF CON 30 Retail Hacking Village - Spicy Wasabi - Rock The Cash Box | pg3guV3UrY4 | 46:01 | 161M |
| DEF CON 31 - Hacker Badges Interview - video team | 7lL1Fo3Wp5c | 04:08 | 56M |
| DEF CON 31 - Smashing the State Machine the True Potential of Web Race Conditions - James Kettle | tKJzsaB1ZvI | 42:18 | 118M |
| DEF CON 31 - Tinfoil Hat Contest - Video Team | GxNJ9jEjyLE | 04:30 | 49M |
| DEF CON 31 - Voting Village Interview - video team | TFu2pEWqO_4 | 10:36 | 139M |
| DEF CON 31 - AI Village Interview - video team | rH_s0SpUQTM | 03:00 | 84M |
| DEF CON 31 - An Audacious Plan to Halt the Internet's Ensh*ttification - Cory Doctorow | rimtaSgGz_4 | 45:42 | 301M |
| DEF CON 31 - Car Hacking Village - Exploiting Wireless Side Channels in EV Charging - Kohler, Baker | AM4IRwWokwY | 44:46 | 250M |
| DEF CON 31 - Car Hacking Village Interview - video team | 2YyyTkMdWik | 06:03 | 128M |
| DEF CON 31 - Demystifying (& Bypassing) macOS's Background Task Management - Patrick Wardle | GOoqEVhvNw8 | 47:10 | 153M |
| DEF CON 31 - Fireside Chat with the National Cyber Director - Kemba Walden | ieKgIDOPyNw | 50:18 | 521M |
| DEF CON 31 - Foxhunt Interview - video team | Gwft7ZVlLLQ | 03:25 | 34M |
| DEF CON 31 - From Feature to Weapon Breaking Microsoft Teams and SharePoint - Nestori Syynimaa | Qaf6JMXXvnU | 34:21 | 182M |
| DEF CON 31 - Game Changing Advances in Windows Shellcode Analysis - Brizendine, Kersten, Hince | ldg0K2wMxwE | 43:28 | 561M |
| DEF CON 31 - Getting a Migraine - Unique SIP Bypass on MacOS - Or, Pearse, Bohra | zxZesAN-TEk | 42:39 | 147M |
| DEF CON 31 - Hack the Box Interview - Video Team | k4ZV9v9nRBQ | 03:11 | 42M |
| DEF CON 31 - Hack the Future - Why Congress & White House Support AI Red Teaming - Austin Carson | QWaW23sraZ8 | 45:03 | 342M |
| DEF CON 31 - Hack-A-Sat Interview - video team | q2trWkuVSGw | 04:36 | 44M |
| DEF CON 31 - Hacker Boxes Interview - video team | z13QA6n_N-0 | 02:09 | 28M |
| DEF CON 31 - Hacker Court Interactive Scenario - winn0na, and Panel | KoWeYEOSBOg | 59:41 | 834M |
| DEF CON 31 - Hacker Memorial Interview - video team | uxkurgqx_ZI | 05:27 | 88M |
| DEF CON 31 - HL7Magic Medical Data Hacking Made Easy - Katie Inns | YFbAuhnUEQQ | 21:36 | 194M |
| DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards - Bertocchi, Campbell, Gibson, Harris | 1JT_lTfK69Q | 45:04 | 207M |
| DEF CON 31 - IOT Village Interview - video team | B8Tz9a-MJQo | 08:16 | 60M |
| DEF CON 31 - J4 Gate, The Hustler Poker Cheating Scandal investigation - Scott Melnick | 6sCRRSBTyYA | 44:50 | 252M |
| DEF CON 31 - Leveraging macOS Networking Frameworks to Heuristically Detect Malware - Patrick Wardle | BZhaTbF4W4k | 48:29 | 296M |
| DEF CON 31 - LLMs at the Forefront Pioneering the Future of Fuzz Testing - X | k9gt7MNXPDY | 43:38 | 587M |
| DEF CON 31 - Lockpicking Village Interview - video team | DsTEbsNM2G0 | 03:08 | 26M |
| DEF CON 31 - Look Ma Im the CEO - Real Time Video and Audio Deep Fake -Gal Zror | W8fbKYjbFD4 | 20:53 | 158M |
| DEF CON 31 - Meduza - Exiled Pirate Media Outlet Breaks Thru the Kremlin Propaganda Firewall - Alex | pTRiT7je5fA | 33:35 | 393M |
| DEF CON 31 - mTLS When Certificate Authentication Done Wrong Michael Stepankin | QNwQ90hI874 | 19:29 | 52M |
| DEF CON 31 - ndays are also 0days - Bohan Liu, Zheng Wang, GuanCheng Li | N7QnYp1w1Xs | 39:50 | 145M |
| DEF CON 31 - Packet Hacking Village - Pwning the Pwners with Mindware - Frank D9 DiGiovanni | IfKRhIR9kng | 40:48 | 226M |
| DEF CON 31 - Password Cracking Village Interview - video team | HFgIDy0ijLE | 06:00 | 78M |
| DEF CON 31 - Physical Attacks Against Smartphones - Christopher Wade | 31xrNuH1RV4 | 37:00 | 178M |
| DEF CON 31 - Policy How Hackers Can Work with Govt to Protect High Risk Communities - Panel | 90-o_mlUBms | 34:53 | 196M |
| DEF CON 31 - Policy Village Interview - video team | jDgYDNqDPI0 | 04:02 | 35M |
| DEF CON 31 - Power Corrupts Corrupt It Back! Hacking Power Management in Data Centers - Quinn, Chick | k2Vx7hstOKY | 41:53 | 214M |
| DEF CON 31 - Private Keys in Public Places - Tom Pohl | 7t_ntuSXniw | 40:06 | 432M |
| DEF CON 31 - Private Until Presumed Guilty - Allison Young, Diane Akerman | 4FecAiofbHY | 44:49 | 286M |
| DEF CON 31 - Prototype Pollution Leads to Remote Code Execution in NodeJS - Shcherbakov, Balliu | gCVTbfDecwI | 20:17 | 110M |
| DEF CON 31 - Red Team Village Preview - video team | nCEGBQyMxK4 | 02:58 | 62M |
| DEF CON 31 - Reproductive Justice in the Age of Digital Surveillance - McSherry, Bertash, Barnett | Gdn_jKdABo4 | 52:57 | 882M |
| DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew | 6j4en3EbP3w | 44:14 | 125M |
| DEF CON 31 - Revolutionizing ELF binary patching w Shiva - ElfMaster | TDMWejaucdg | 45:48 | 243M |
| DEF CON 31 - Runtime Riddles - Abusing Manipulation Points in the Android Source - Laurie Kirk | Bq7Z3X4xwCE | 41:59 | 172M |
| DEF CON 31 - Scavenger Hunt Interview - video team | 0nwYCaHS7TA | 05:45 | 46M |
| DEF CON 31 - Second Breakfast Implicit & Mutation Based Serialization Vulns in NET - Jonathan Birch | v0fraChyonQ | 35:04 | 191M |
| DEF CON 31 - Securing Critical Versions of your Reality - Suzanne Borders Keenan Skelly | OJ7a_dnKXnA | 45:39 | 633M |
| DEF CON 31 - Shall We Play a Game - Craig Martell | VLqu06vVDGA | 47:09 | 710M |
| DEF CON 31 - Small Leaks, Billions Of Dollars - Nikolaos Makriyannis, Oren Yomtov | LfZcS_G-Zcs | 33:08 | 363M |
| DEF CON 31 - Snoop On To Them, As They Snoop On To Us - Alan Meekins | cO1JSzAdPM8 | 23:22 | 75M |
| DEF CON 31 - SODA Machine with DualD - video team | pmW6lMCEaJc | 02:23 | 65M |
| DEF CON 31 - Spooky Authentication at a Distance - Tamas Jos | 7oAZK8x_mL0 | 45:01 | 244M |
| DEF CON 31 - Spread Spectrum techniques for anti drone evasion David Melendez, Gabriela Garcia | 8Ng91UY3D2M | 41:26 | 305M |
| DEF CON 31 - StackMoonwalk - Alessandro Magnosi, Arash Parsa, Athanasios Tserpelis | _2lH90C2nOM | 39:41 | 138M |
| DEF CON 31 - Still Vulnerable Out of the Box - Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou | mYLa1f6LoLI | 43:05 | 256M |
| DEF CON 31 - Tetra Tour de Force Jailbreaking Digital Radios & Base Stations for Fun - Midnight Blue | iGINoIYQwak | 01:10:13 | 266M |
| DEF CON 31 - The Hackers, The Lawyers, And The Defense Fund - Geiger, Opsahl, McCain, Croc | 9Tqp-qJ0__Q | 43:36 | 573M |
| DEF CON 31 - The Internals of Veilid, a New Decentralized Application Framework - DilDog, Medus4 | Kb1lKscAMDQ | 41:16 | 92M |
| DEF CON 31 - Tin Foil Hat Contest Interviews - video team | E9bzhZQVtzM | 04:23 | 112M |
| DEF CON 31 - Top Tips for new DEF CON Attendees - video team | ezo0Lf-7l6M | 16:17 | 132M |
| DEF CON 31 - Track the Planet! Mapping IDs, Monitoring Presence in the Azure Ecosystem - nyxgeek | 4AY5uS3yFjE | 31:56 | 102M |
| DEF CON 31 - Turning my virtual wallet into a skimming device - Borgogno, Barrionuevo | NGhamH4_CZY | 42:17 | 504M |
| DEF CON 31 - Unlocking Doors from Half a Continent Away - Trevor Stevado, Sam Haskins | rogtZjpyoVQ | 37:57 | 122M |
| DEF CON 31 - Unlocking Hidden Powers in Xtensa based Qualcomm Wifi Chips - Daniel Wegemer | QMO2vMBcx7Y | 36:51 | 99M |
| DEF CON 31 - Unparalleled RDP Monitoring Reveal Attackers Tradecraft -Bergeron, Bilodeau | Djm53qUPhVY | 44:20 | 340M |
| DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data - Dennis Giese | AfMfYOUYZvc | 44:25 | 182M |
| DEF CON 31 - VDA Shenanigans Attacking & Defending the Truck Part that Gets Left Behind - Ford, Reu | yX0_e4Szn5s | 28:37 | 169M |
| DEF CON 31 - Video Based Cryptanalysis Extracting Keys from Power LEDs - Ben Nassi, Ofek Vayner | 2a_vVt96JhE | 43:44 | 127M |
| DEF CON 31 - Visual Studio Code is Why I Have Workspace Trust Issues - Chauchefoin, Gerste | sdiHfVhPso4 | 38:25 | 247M |
| DEF CON 31 - War Stories - Finding Foes and Yourself with Latency Trilateration - Lorenzo Cococcia | _iAffzWxexA | 20:43 | 89M |
| DEF CON 31 - War Stories - Youre Not George Clooney, and This Isnt Oceans 11 - Andrew Brandt | RRjre0dnOGQ | 44:18 | 269M |
| DEF CON 31 - Warshopping- Phreaking Smart Shopping Cart Wheels Through RF Sniffing - Joseph Gabay | iprBprAFXCk | 38:24 | 446M |
| DEF CON 31 - Weaponizing Plain Text ANSI Escape Sequences as a Forensic Nightmare - STÖK | 3T2Al3jdY38 | 40:31 | 212M |
| DEF CON 31 -DARPA AI Cyber Challenge Announcement - Perri Adams, Panel | DFnxrsEvs7M | 21:26 | 259M |
| DEF CON 31 Adversary Wars Interview - video team | PtK-01D6ozQ | 04:55 | 49M |
| DEF CON 31 Car Hacking Village - How an Auto Security Researcher Had His Car Stolen - Tabor, Tindell | XZK5TvnJjXg | 45:37 | 577M |
| DEF CON 31 Data Dupe Village - What 10 Years of Drive Stats Data Can Tell Us - Andy Klein | YhWyaZ__fL8 | 45:26 | 212M |
| DEF CON 31 Packet Hacking Village - OSINT for Physical Security Intelligence - Raggo, Hosmer | T6br9iG5PH4 | 37:51 | 207M |
| DEF CON 31 Packet Hacking Village - The Importance of Arts and Crafts in ThreatOps - Pete Hay | R26pGUKU6ME | 43:39 | 263M |
| DEF CON 31 Packet Hacking Village - WINE Pairing with Malware - Jared Stroud | s_YqtMhTr4k | 32:12 | 198M |
| DEF CON 31 Policy - Blocking Pathways into Cybercrime Current Efforts, Future Opportunities - Panel | 16rrxMS7YX8 | 48:31 | 322M |
| DEF CON 31 Policy - Demystifing Hacking for Government Officials - Panel | Muo__x35ju8 | 47:53 | 549M |
| DEF CON 31 Policy - A Global Approach to Tackling Software Resilience - Panel | ODzAs7eJ988 | 01:47:40 | 1G |
| DEF CON 31 Policy - All Your Vulns Are Belong to Terms and Conditions - | Baawazw6J7A | 51:53 | 867M |
| DEF CON 31 Policy - Cyber Policy Adrift - Panel | 6Igptw_KDFA | 51:34 | 704M |
| DEF CON 31 Policy - Navigating the Digital Frontier Advancing Cyber Diplomacy - Panel | V93p147ag98 | 54:49 | 911M |
| DEF CON 31 Trailer! | 0klQiFT1BBE | 02:37 | 50M |
| DEF CON 31 War Stories - A Different Uber Post Mortem - Joe Sullivan | -Pqz3C9gNCw | 49:19 | 339M |
| DEF CON 31 War Stories - A Series of Unfortunate Events - Ben Sadeghipour, Corben Leo | Hw5jSmmcDl0 | 34:09 | 156M |
| DEF CON 31 War Stories - CON trolling the Weather - Paz Hameiri | 9R-mWbxMN4I | 37:50 | 233M |
| DEF CON 31 War Stories - Cracking Cicada 3301 - Taiiwo, Artorias, Puck, TheClockworkBird | EU1ftYdZkkI | 41:58 | 452M |
| DEF CON 31 War Stories - Designing RFID Implants Flipping the Bird Opens Doors - Miana Ella Windall | OyRxapMjLP0 | 44:35 | 283M |
| DEF CON 31 War Stories - Legend of Zelda Use After Free - Allan Cecil | rCxRjjLs6z0 | 46:43 | 321M |
| DEF CON 31 War Stories - Living Next Door to Russia - Mikko Hypponen | m9_feSPH47I | 47:46 | 308M |
| DEF CON 31 War Stories - New Isn’t Always Novel Grep Your Way to $20K at Pwn2Own - Horseman, Hanley | vBFKVUQvESM | 37:03 | 204M |
| DEF CON 31 War Stories - Nuthin But A G Thang Evolution of Cellular Networks - Tracy Mosley | t4SHqKyDmH8 | 43:28 | 254M |
| DEF CON 31 War Stories - The Risks of Pointing Out the Emperor is Buck Naked - Renderman, Tom Dang | fL1osBUEScY | 46:02 | 199M |
| DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin | zccAvgC4UxU | 20:30 | 61M |
| DEF CON 31 War Stories - UNConventional Cybercrime - Bad Treaty Becoming Law - Rodriguez, Budington | 8cANuTuAkds | 25:19 | 108M |
| DEF CON 31 XR Village - The History of XR From Fiction to Reality - Starr Brown, Bob Gourley | O1xhxAie7ac | 15:45 | 209M |
| DEF CON 31 XRVillage - Fireside Chat - Brittan Heller | Nnwa_45AQbs | 49:15 | 934M |
| DEF CON 31- Lions & Tigers and Fancy Bears, Oh My! A Cautionary Tale - Jen Easterly, Scott Shapiro | gj7CptsKXYU | 34:52 | 347M |
| DEF CON 32 - How State Laws Meant to Protect Children Raise Other Risks - Anthony Hendricks | TuAZXkMCgXI | 21:59 | 307M |
| DEF CON 32 - 1 for All, All for WHAD: wireless shenanigans made easy - Romain Cayre, Damien Cauquil | 4xjRgr4dbzU | 44:40 | 459M |
| DEF CON 32 - 3DU Homo ex Machina - Lacey Harbour | YvqWlZK_fks | 23:43 | 414M |
| DEF CON 32 - A dive into world of Aircraft PKI - Matt Gaffney | sjd5LrzHus0 | 25:06 | 137M |
| DEF CON 32 - A Shadow Librarian: Fighting back against encroaching capitalism - Daniel Messe | IJT6_OcY_dc | 43:02 | 334M |
| DEF CON 32 - Abusing legacy railroad signaling systems - David Meléndez, Gabriela Gabs Garcia | RHhyrcgm7n4 | 42:51 | 680M |
| DEF CON 32 - Abusing Windows Hello Without a Severed Hand - Ceri Coburn, Dirk jan Mollema | mFJ-NUnFBac | 41:58 | 207M |
| DEF CON 32 - Access Control Done Right the First Time - Tim Clevenger | WscuQr5X1kc | 24:21 | 256M |
| DEF CON 32 - AIxCC Closing Ceremonies | FDVcF28PPnI | 37:51 | 693M |
| DEF CON 32 - AMD Sinkclose-Universal Ring2 Privilege Escalation - Enrique Nissim, Krzysztof Okupski | kEIJFsOgEBY | 43:34 | 371M |
| DEF CON 32 - Analyzing the Security of Satellite Based Air Traffic Control -Martin Strohmeier | vJWzTt2ANAQ | 24:05 | 132M |
| DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini | YPcOwKtRuDQ | 54:12 | 216M |
| DEF CON 32 - AppSec Considerations From the Casino Industry - Aleise McGowan, Tennisha Martin | k7odY9gCxaI | 18:22 | 144M |
| DEF CON 32 - Atomic Honeypot-A MySQL Honeypot That Drops Shells - Alexander Rubin, Martin Rakhmanov | 8oAxv7UBZJA | 21:58 | 231M |
| DEF CON 32 - Attacks on GenAI data & using vector encryption to stop them - Patrick Walsh, Bob Wall | Lxg9YyFJ8s0 | 26:18 | 169M |
| DEF CON 32 - Autos, alcohol, blood, sweat, & creative reversing obfuscated Car Modding tool - Atlas | uKvkBchZkA0 | 40:52 | 460M |
| DEF CON 32 - AWS CloudQuarry: Digging for secrets in public AMIs - Eduard Agavriloae, Matei Josephs | 7k3zOylPKbM | 39:32 | 323M |
| DEF CON 32 - Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panel - Vangelis Stykas | T5K4ABfzkhI | 38:58 | 327M |
| DEF CON 32 - Behind Enemy Lines: Going undercover to breach LockBit Ransomware Op- Jon DiMaggio | dLOUzF6_Y54 | 36:20 | 293M |
| DEF CON 32 - Behind the Badge:How we used hardware to make AV badge - Adam Batori, Robert Pafford | dDFtkjYx0V8 | 21:02 | 138M |
| DEF CON 32 - Bluetooth Blues: Unmasking CVE 2023-52709-The TI BLE5-Stack Attack - Kevin Mitchell | mrb_3z5OP2M | 26:30 | 204M |
| DEF CON 32 - BOLABuster-Harnessing LLMs for Automating BOLA Detection - Ravid Mazon, Jay Chen | 9bNv3XkhjQA | 32:40 | 200M |
| DEF CON 32 - Breaching AWS Through Shadow Resources - Yakir Kadkoda, Michael Katchinskiy, Ofek Itach | m9QVfYVJ7R8 | 37:11 | 273M |
| DEF CON 32 - Breaking Boundaries: Popping Shells in the Airgap w $10 & Arduino Magic - Daniel Beard | zqGB07UaI6A | 24:18 | 138M |
| DEF CON 32 - Breaking network crypto in popular Chinese keyboard apps - Jeffrey Knockel, Mona Wang | RgCI3GOXLr0 | 48:34 | 301M |
| DEF CON 32 - Breaking Secure Web Gateways for Fun and Profit -Vivek Ramachandran, Jeswin Mathai | mBZQnJ1MWYI | 47:09 | 191M |
| DEF CON 32 - Breaking the Beam:Exploiting VSAT Modems from Earth - Lenders, Willbold, Bisping | -pxmly8xeas | 39:39 | 285M |
| DEF CON 32 - Bridging Space and Medicine - Fernando De La Peña Llaca | 8BC0oHu5QGQ | 35:31 | 187M |
| DEF CON 32 - Building a secure resilient nationwide EV charging network - Harry Krejsa, Sarah Hipel | UmBNgn_9-zY | 22:54 | 330M |
| DEF CON 32 - Bypass 101- Bill Graydon | qY0Yb8_R3a0 | 22:28 | 141M |
| DEF CON 32 - Counter Deception: Defending Yourself in a World Full of Lies - Tom Cross, Greg Conti | gHqDEMrqTjE | 42:54 | 212M |
| DEF CON 32 - Curious Case of Alice&Bob: What You Can Do as Digital Investigators - Catherine Ullman | sp91zygVcmE | 53:53 | 495M |
| DEF CON 32 - DC101 - Panel | zGgPm2LeM8A | 45:08 | 922M |
| DEF CON 32 - DEF CON Closing Ceremonies & Awards | GdeKrNlvG8g | 02:14:27 | 2G |
| DEF CON 32 - Defeating Secure Code Review GPT Hallucinations - Wang Zhilong, Xinzhi Luo | WsRSzJsrWAw | 17:57 | 211M |
| DEF CON 32 - Detecting persistent threats on Draytek devices - Octavio Gianatiempo, Gastón Aznarez | BiBMsw0N_mQ | 35:42 | 222M |
| DEF CON 32 - Exposing the Occultations in Large Off-Grid Solar Systems - Dan Berte & Alexandru Lazar | wCt-93lEIME | 18:05 | 190M |
| DEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashing | cFW0sYSo7ZM | 36:54 | 143M |
| DEF CON 32 - How To Keep IoT From Becoming An IoTrash - Roberts, Wysopal, Doctorow, Wheeler, Giese | tA7bpp8qXxI | 46:42 | 1G |
| DEF CON 32 - Lessons Learned from Building & Defending LLM Applications - Javan Rasokat, Andra Lezza | 2-C7xSJ9rhI | 27:04 | 195M |
| DEF CON 32 - Listen to the Whispers: Web Timing Attacks that Actually Work - James Kettle | zOPjz-sPyQM | 42:37 | 90M |
| DEF CON 32 - MaLDAPtive: Obfuscation and De-Obfuscation - Daniel Bohannon, Sabajete Elezaj | mKRS5Iyy7Qo | 46:42 | 551M |
| DEF CON 32 - Manipulating Shim and Office for Code Injection - Ron Ben-Yizhak, David Shandalov | -Z34ya4rb8A | 41:12 | 333M |
| DEF CON 32 - Offensive Security Testing Safeguarding the Final Frontier - Andrzej Olchawa | YtMutNk8RpY | 14:01 | 84M |
| DEF CON 32 - OH MY DC Abusing OIDC all the way to your cloud - Aviad Hahami | asd33hSRJKU | 37:39 | 140M |
| DEF CON 32 - On Your Ocean's 11 Team, I'm the AI Guy (technically Girl) - Harriet Farlow | pTSEViCwAig | 37:41 | 683M |
| DEF CON 32 - Open Sesame: how vulnerable is your stuff in electronic lockers -Dennis Giese, braelynn | GPODCSvZMyM | 40:08 | 219M |
| DEF CON 32 - Open Source Hacker V. Government Lawyer - Rebecca Lively, Eddie Zaneski | TqLRpUmpBWY | 34:47 | 644M |
| DEF CON 32 - Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows - samy kamkar | R5nMqju6crY | 45:34 | 242M |
| DEF CON 32 - Physical OSINT - Lukas McCullough | ksbFhXdF2EI | 15:43 | 100M |
| DEF CON 32 - Pick Your Poison: Navigating a secure clean energy transition - Emma Stewart | PZfM1ehcfmU | 30:45 | 179M |
| DEF CON 32 - Porn & Privacy - ET | RyuDq0cjap0 | 21:09 | 240M |
| DEF CON 32 - Practical Exploitation of DoS in Bug Bounty - Roni Lupin Carta | b7WlUofPJpU | 30:34 | 383M |
| DEF CON 32 - Preparing for the Future: A Discussion of our Rapidly Evolving Threat Landscape - Panel | dGSPysbdvJo | 13:32 | 251M |
| DEF CON 32 - Process Injection Attacks w ROP - Bramwell Brizendine, Shiva Shashank Kusuma | 1Hx-PzyGtX0 | 22:47 | 264M |
| DEF CON 32 - Programming a CTS-V Gauge Cluster into an ATS-V, out of pure spite - Varjitt Jeeva | hnUG3hB0qVI | 15:16 | 88M |
| DEF CON 32 - Psychic Paper: Making eink access badges accessible for anyone - Joshua Herman | ssLu8xHMwSk | 26:50 | 162M |
| DEF CON 32 - QuickShell Sharing is caring abt RCE attack chain on QuickShare - Or Yair, Shmuel Cohen | wT9gyOeN6zY | 45:07 | 372M |
| DEF CON 32 - Redefining V2G: How to use your vehicle as game controller -Timm Lauser, Jannis Hamborg | Dh220NQIkaQ | 38:59 | 274M |
| DEF CON 32 - Reflections on a Decade in Bug Bounties - Nikhil Shrivastava & Charlie Waterhouse | h86p7pcZmL8 | 59:12 | 828M |
| DEF CON 32 - Relative Path File Injection The Next Evolution in RPO - Ian Hickey | 3y_6oSZwLr0 | 29:10 | 158M |
| DEF CON 32 - Reverse engineering and hacking Ecovacs robots - Dennis Giese, Braelynn Hacker | _wUsM0Mlenc | 41:40 | 271M |
| DEF CON 32 - Reverse Engineering MicroPython Frozen Modules - Wesley McGrew | QXa29AJqdRc | 43:22 | 281M |
| DEF CON 32 - RF Attacks on Aviation's Defense Against Mid-Air Collisions - G. Longo, V. Lenders | p1H6-0clP7U | 26:21 | 176M |
| DEF CON 32 - RFID 101 - Ege Feyzioglu & Andrew M | 0Zn5nj0NZVo | 20:56 | 157M |
| DEF CON 32 - Safecracking for Everyone - Jared Dygert | 6qTLxglm2fs | 29:21 | 183M |
| DEF CON 32 - SBOMs the Hard Way Hacking Bob the Minion - Larry Pesce | Cxrwpij2MSQ | 20:54 | 290M |
| DEF CON 32 - Secret Life of Rogue Device: Lost IT Assets on the Public Marketplace - Matthew Bryant | QgeEHdAmJDg | 30:15 | 225M |
| DEF CON 32 - Secrets & Shadows: Leveraging Big Data for Vulnerability Discovery - Bill Demirkapi | -KXgcWuv-Ug | 42:24 | 391M |
| DEF CON 32 - Securing CCTV Cameras Against Blind Spots - Jacob Shams | hB6rtwoyyrg | 16:08 | 115M |
| DEF CON 32 - Securing Frontends at Scale;Paving our Way to Post XSS World - jen ozmen, Aaron Shim | vEzLsRXjatw | 24:41 | 241M |
| DEF CON 32 - Signature-Based Detection Using Network Timing - Josh Pyorre | 6lJ26UG9hLU | 42:43 | 550M |
| DEF CON 32 - Simulating attacks against hydroelectric power plants - Julia Dewitz-Würzelberger | O48DBFT02eU | 22:40 | 185M |
| DEF CON 32 - Small Satellite Modeling and Defender Software - Kyle Murbach | 42OjQtrJQ5s | 24:40 | 159M |
| DEF CON 32 - Smishing Smackdown: Unraveling the Threads of USPS Smishing and Fighting Back - S1nn3r | gLOv67LlIQs | 30:34 | 219M |
| DEF CON 32 - Sneaky Extensions The MV3 Escape Artists - Vivek Ramachandran, Shourya Pratap Singh | AS_bSDxTU4w | 20:31 | 125M |
| DEF CON 32 - So you wanna know how to make badges - c0ldbru | p4zQ9oOQl9w | 46:09 | 315M |
| DEF CON 32 - Social Engineering Like you’re Picard - Jayson E Street | kc25CttuDmw | 46:49 | 239M |
| DEF CON 32 - Solving the Lover, Stalker, Killer Murder with strings, grep, and Perl - Anthony Kava | _1GvHMlzXOY | 21:56 | 374M |
| DEF CON 32 - Speed Bumps and Speed HacksP: Adventures in Car Mfg Security - Paulo Silva, David Sopas | p8NMZoPM8Yc | 31:30 | 183M |
| DEF CON 32 - Spies and Bytes: Victory in the Digital Age - General Paul M Nakasone | Fd6v9NXmszM | 44:10 | 1G |
| DEF CON 32 - Splitting the email atom exploiting parsers to bypass access controls - Gareth Heyes | JERBqoTllaE | 36:15 | 251M |
| DEF CON 32 - SQL Injection Isn't Dead Smuggling Queries at the Protocol Level - Paul Gerste | Tfg1B8u1yvE | 38:13 | 132M |
| DEF CON 32 - Sshamble Unexpected Exposures in the Secure Shell - HD Moore, Rob King | G7GwXu684JY | 45:23 | 438M |
| DEF CON 32 - Stranger in a Changed Land - Tony Sager | UCHguFqzAOQ | 29:20 | 433M |
| DEF CON 32 - Student Engagement Doesn't Have to Suck - Dr Muhsinah Morris | dvV0y7gKCro | 24:20 | 142M |
| DEF CON 32 - Sudos and Sudon’ts: Peering inside Sudo for Windows - Michael Torres | -iNezAL_EF0 | 27:20 | 217M |
| DEF CON 32 - Taming the Beast: Inside Llama 3 Red Team Process - Grattafiori, Evtimov, Bitton | UQaNjwLhAmo | 32:22 | 217M |
| DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix | 6SNy0u6pYOc | 32:29 | 114M |
| DEF CON 32 - The edges of Surveilance System and its supply chain - Chanin Kim, Myounghun Pak | v6VMEeUcqzo | 43:48 | 301M |
| DEF CON 32 - The hack, the crash and two smoking barrels. - Thomas Sermpinis | MDndWJxfP-U | 39:38 | 411M |
| DEF CON 32 - The Immortal Retrofuturism of Mainframes and How to Keep Them Safe- Michelle Eggers | 1upEyCKVpkI | 25:47 | 181M |
| DEF CON 32 - The Interplay between Safety and Security in Aviation Systems - Lillian Ash Baker | nGDTVPnTDOw | 20:04 | 155M |
| DEF CON 32 - The Past, Present, and Future of Bioweapons - Panel | slpJQmm3L8k | 33:03 | 204M |
| DEF CON 32 - The Pwnie Awards | jEexnbk9kaI | 49:41 | 889M |
| DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims | cHsRxkfxvq8 | 47:40 | 351M |
| DEF CON 32 - The Risk and Reward of Distributed Industrial Control - Joe Slowik | 13o-MQtANpo | 26:35 | 175M |
| DEF CON 32 - The Village Peoples' Panel What Really Goes On in a Village - Panel | vRjB6TutzuM | 55:11 | 1G |
| DEF CON 32 - The Way To Android Root: Exploiting Smartphone GPU - Xiling Gong, Eugene Rodionov | BN07rjaNqXk | 46:18 | 279M |
| DEF CON 32 - The wild and wonderful world of early Microprocessors w⧸a focus on 6502 - Michael Brown | ldsK81hGs_Q | 53:29 | 321M |
| DEF CON 32 - The XZ Backdoor Story: The Undercover Op That Set the Internet on Fire - Thomas Roccia | hwuIb-Vv2Ew | 41:41 | 316M |
| DEF CON 32 - Threat Modeling in the Age of AI - Adam Shostack | tYOJeChUM4M | 26:25 | 369M |
| DEF CON 32 - Top War Stories from a TryHard Bug Bounty Hunter -Justin Rhynorater Gardner | TqKb7h8VFcA | 50:37 | 168M |
| DEF CON 32 - Tough Adversary Don’t Blame Sun Tzu - Gregory Carpenter, DrPH | A-J3jGofYN8 | 22:45 | 118M |
| DEF CON 32 - Transforming AppSec Protecting 'Everything as Code' - Kunal Bhattacharya | WG_oXtUTEoI | 44:58 | 594M |
| DEF CON 32 - Travel Better Expedient Digital Defense - Grey Fox | JbnHaBY0sWM | 22:09 | 177M |
| DEF CON 32 - Troll Trapping Through TAS Tools Exposing Speedrunning Cheaters - Allan Cecil | jALLbBisg_8 | 43:49 | 745M |
| DEF CON 32 - UDSonCAN Attacks Discovering Safety Critical Risks by Fuzzing - Seunghee Han | zkoTwQRXMz0 | 23:29 | 130M |
| DEF CON 32 - Unlocking the Gates Hacking a secure Industrial Remote Access Solution - Moritz Abrell | fc6c2hP86Wk | 18:25 | 47M |
| DEF CON 32 - Unlocking the Gates: Understanding Authentication Bypass Vulnerabilities - Vikas Khanna | gg5zsWyZJ90 | 30:31 | 168M |
| DEF CON 32 - Unsaflok: Hacking millions of hotel locks - Lennert Wouters, Ian Carroll | 4cx0RUV7i0s | 41:32 | 234M |
| DEF CON 32 - Using AI Computer Vision in Your OSINT Data Analysis - Mike Raggo | TK3A510jArc | 52:39 | 333M |
| DEF CON 32 - Using EPSS for Better Management Vulnerability Management - Jerry Gamblin | 02ElRMhArcQ | 24:31 | 127M |
| DEF CON 32 - V2GEvil: Ghost in the Wires - Pavel Khunt & Thomas Sermpinis aka Cr0wTom | Ui2etjRyrUE | 24:19 | 155M |
| DEF CON 32 - War Games Red Team for OT Based on Real World Case Studies- Shishir Gupta | Utz4o7CJmAU | 23:08 | 126M |
| DEF CON 32 - Warflying in a Cessna - Matt Thomassen, Sean McKeever | anrgU7LjN1A | 24:28 | 214M |
| DEF CON 32 - Web2 Meets Web3 Hacking Decentralized Applications - Peiyu Wang | QipdGm6HffM | 24:15 | 136M |
| DEF CON 32 - Welcome to DEF CON 32 - The Dark Tangent | vad7FiHlgMU | 20:16 | 711M |
| DEF CON 32 - What History’s Greatest Heist Can Teach Us About Defense In Depth - Pete Stegemeyer | pri4EJ0634c | 29:47 | 349M |
| DEF CON 32 - What To Expect When You’re Exploiting: 0Days Baby Monitors & Wi-Fi Cams - Mager, Forte | caY7ls4G460 | 40:01 | 141M |
| DEF CON 32 - Where’s the Money-Defeating ATM Disk Encryption - Matt Burch | lF8NEsl3-kQ | 38:33 | 240M |
| DEF CON 32 - Whose Slide Is It Anyway | WZJJgkftzOs | 52:30 | 1G |
| DEF CON 32 - Why are you still using my server for your internet access - Thomas Boejstrup Johansen | uwsykPWa5Lc | 39:09 | 159M |
| DEF CON 32 - Windows Downdate: Downgrade Attacks Using Windows Updates - Alon Leviev | HHmxuxQ7bE8 | 35:17 | 223M |
| DEF CON 32 - Winning the Game of Active Directory - Brandon Colley | M-2d3sM3I2o | 43:04 | 665M |
| DEF CON 32 - Xiaomi The Money : Our Toronto Pwn2Own Exploit & BTS Story - Ken Gannon, Ilyes Beghdadi | B0A8F_Izmj0 | 39:01 | 287M |
| DEF CON 32 - XR for All: Accessibility and Privacy for Disabled Users - Dylan Fox | LysMyDrOGn4 | 22:55 | 376M |
| DEF CON 32 - You got a lighter I need to do some Electroporation - J. Utley, P. Rhodes, J. Hill | -ad-Y18pY54 | 27:14 | 180M |
| DEF CON 32 - Your AI Assistant has a Big Mouth: A New Side Channel Attack - Yisroel Mirsky | I1RqhGGRmHY | 39:58 | 307M |
| DEF CON 32 - Your CI CD Pipeline Is Vulnerable, But It's Not Your Fault - Elad Pticha, Oreen Livni | 3dHZ-l3XSsE | 25:44 | 160M |
| DEF CON 32 -Ticking SQLi - Iggy | bVKtcu82a8w | 25:08 | 312M |
| DEF CON 32 -Your Smartcard is Dumb A Brief History of Hacking Access Control Systems - Chad Shortman | zBP2deuPQTg | 53:21 | 201M |
| DEF CON 33 - Breaking into thousands of cloud based VPNs with 1 bug -David Cash, Rich Warren | RNXCnJvE1Zg | 38:48 | 143M |
| DEF CON 33 - Hard Hat Brigade Creations Q&A - MrBill, M0nkeyDrag0n, CoD_Segfault | PK6F4LdwwOU | 36:38 | 163M |
| DEF CON 33 - Live Music - Thursday Night - N8 | -97xg_1a66E | 01:00:50 | 1G |
| DEF CON 33 Recon Village - A Playbook for Integration Servers - Ryan Bonner, Guðmundur Karlsson | wgf5GKrY3nc | 22:01 | 84M |
| DEF CON 33 Recon Village - Pretty Good Pivot - Simwindie | 6mykx1zS1yo | 37:50 | 126M |
| DEF CON 33 Video Team - Torvik from Tulip Tree Tech | AdQwcvijMXA | 33:17 | 266M |
| DEF CON 33 Voting Village - Risk Limiting Audits: What They Are and Aren't - Philip Stark | f-QuFskAyOM | 58:04 | 271M |
| DEF CON 33 - Bypassing Intent Destination Checks, LaunchAnyWhere Privilege Escalation - Qidan He | kSJBEZkJ4vM | 46:31 | 163M |
| DEF CON 33 - Decision Making in Adversarial Automation - Bobby Kuzma, Michael Odell | 9to68PN5rRU | 26:54 | 155M |
| DEF CON 33 - How malicious packages on npm bypass existing security tools - Paul McCarty | emhocCFs9N4 | 32:38 | 152M |
| DEF CON 33 - How Nation-State Hackers Turn Human Error into Catastrophic Failures - N Case, J McCoy | 77AixFQKwVI | 36:03 | 103M |
| DEF CON 33 - Mac PRT Cookie Theft & Entra ID Persistence - Shang-De Jiang, Dong-Yi Ye, Tung-lin Lee | T13YfM8z0lE | 41:13 | 248M |
| DEF CON 33 - Making a custom Hashcat module to solve a decade-old puzzle challenge - Joseph Gabay | 74_4Q329PH8 | 48:24 | 341M |
| DEF CON 33 - The Missing Link: Draytek’s New RCEs Complete the Chain - O. Gianatiempo & G. Aznarez | CUZhORHp27U | 24:52 | 108M |
| DEF CON 33 - 'We are currently clean on OPSEC' - The Signalgate Saga - Micah 'micahflee' Lee | 5VlhsT5Kbsk | 42:07 | 141M |
| DEF CON 33 - 10 Years of IoT Village: nsights in the World of IoT - Stephen Bono, Rachael Tubbs | V23bcIGHe7k | 20:49 | 218M |
| DEF CON 33 - 40 Years Of Phrack: Hacking, Zines & Digital Dissent -richinseattle, Netspooky, Chompie | TW-D1I27E08 | 42:30 | 231M |
| DEF CON 33 - 7 Vulns in 7 Days - Breaking Bloatware Faster Than It’s Built - Leon 'leonjza' Jacobs | zSBf2CMKlBk | 39:56 | 105M |
| DEF CON 33 - Access Control Done Right the First Time - Tim Clevenger | 6OFZjlym4r0 | 22:51 | 95M |
| DEF CON 33 - Access to secure dependency management everywhere w Nix- T Berek, F Zakaria & D Baker | CdNrvUrG_HM | 53:01 | 869M |
| DEF CON 33 - All your keyboards are belong to us! - Federico Lucifredi | KeNBWILSlC4 | 37:34 | 225M |
| DEF CON 33 - Amber64 - Mining Hacker History from Over 500k Commodore 64 Disks - Wesley McGrew | PqPMyhA4NSI | 44:13 | 203M |
| DEF CON 33 - AppleStorm - Unmasking the Privacy Risks of Apple Intelligence - Yoav Magid | BNmJ3qBP9GE | 38:21 | 270M |
| DEF CON 33 - Ask EFF - Cooper Quintin, Lisa Femia, Thorin Klosowski, Alexis Hancock, Hannah Zhao | QmkyPl2UZHY | 48:35 | 951M |
| DEF CON 33 - AutoDetection & Exploitation of DOM Clobbering Vuln at Scale - Zhengyu Liu, Jianjia Yu | JL2PT1Dac3g | 37:42 | 244M |
| DEF CON 33 - Automated Unpacking & Deobfuscation of Nested VM-Based Protectors - Agostino Panico | uCZRf3v3EUI | 38:41 | 146M |
| DEF CON 33 - Back to Basics: Building Resilient Cyber Defenses - Yael Grauer | Y4ziT89VmAk | 21:39 | 72M |
| DEF CON 33 - Bare Metal Reverse Engineering - SolaSec | zfxKbsLKb3E | 22:05 | 94M |
| DEF CON 33 - BiC Village - B I C Pick DEF CON 33 Badge Walkthrough - Eli McRae | BczXjBh6bsM | 14:44 | 84M |
| DEF CON 33 - BiC Village - Embedded System Design vs Traditional Software Design - Ian G Harris | S4jr6k52sNU | 49:46 | 252M |
| DEF CON 33 - BiC Village - Breaking Down Bias in the Cyber Stack - Kaleeque Pierce, Jess Hoffman | OEMnm1GAYlQ | 01:00:30 | 557M |
| DEF CON 33 - BiC Village - Cyber Game Changers Women Who Lead, Secure and Inspire - Panel | qN9qduX-fFM | 43:13 | 287M |
| DEF CON 33 - BiC Village - Following Threat Actors Rhythm to Give Them More Blues - Malachi Walker | F_BTn1FjbHU | 37:11 | 201M |
| DEF CON 33 - BiC Village - From Wake Island to the War Room - Nykolas Muldrow | tWaBeES6b54 | 25:53 | 100M |
| DEF CON 33 - BiC Village - How AI Is Revolutionizing Phishing Attacks & Defenses - Levone Campbell | 7IFsoRaYYgs | 32:30 | 232M |
| DEF CON 33 - BiC Village - How Basketball Officiating Shaped a Cybersec Career - Jason Brooks | XbSK6mvNL8c | 29:24 | 158M |
| DEF CON 33 - BiC Village - Petty Proteins When Molecules Go Rogue& Why Cyberbiosecurity - Tia Pope | ZqjADCvE5UQ | 41:01 | 197M |
| DEF CON 33 - BiC Village - Price of Progress: Ethical Cybersecurity in Tech Communities - Joy Toney | 98LptR2jhqM | 43:59 | 197M |
| DEF CON 33 - BiC Village - The African Cybercrime Economy -Remi Afon | IfmVPqBUAMc | 46:46 | 265M |
| DEF CON 33 - BiC Village - The Truth, Whole Truth and Nothing b⧸t Truth of Cybersec - Louis Deweaver | mU9djJSqdBQ | 57:00 | 390M |
| DEF CON 33 - Bio Cryptography is the Game Genie in a post quantum dystopia - James Utley, PhD | Zx0G6znf_qQ | 19:35 | 78M |
| DEF CON 33 - Blurred Lines: Evolving Tactics of North Korean Cyber Threat Actors - Seongsu Park | j5gxdWd5sMg | 26:52 | 90M |
| DEF CON 33 - Breakin 'Em All – Overcoming Pokemon Go's Anti Cheat Mechanism - Tal Skverer | 2En96Cg9BFw | 47:24 | 107M |
| DEF CON 33 - Breaking into thousands of cloud-based VPNs with one bug - David Cash, Rich Warren | 1mTg32BTZlA | 38:48 | 148M |
| DEF CON 33 - Breaking Wi-Fi Easy Connect: A Security Analysis of DPP - George Chatzisofroniou | gMNZiDfeRPQ | 40:48 | 225M |
| DEF CON 33 - Building a Malware Museum - Mikko Hypponen | u7-OFXLLsmU | 40:11 | 196M |
| DEF CON 33 - Building Onramps for Emergency Web Archiving in Ukraine and Beyond - Quinn Dombrowski | 4uV61EHLKKA | 35:49 | 163M |
| DEF CON 33 - Building the first open source hackable Quantum Sensor - Mark Carney, Victoria Kumaran | ldgMBEnJxms | 43:43 | 242M |
| DEF CON 33 - Bypassing Intent Destination Checks, LaunchAnyWhere Privilege Escalation - Qidan He | e7UnYV-m23c | 46:31 | 172M |
| DEF CON 33 - Carding is Dead, Long Live Carding - Federico Valentini, Allesandro Strino | JSDwexw90zs | 37:32 | 125M |
| DEF CON 33 - Carding, Sabotage & Survival: A Darknet Market Veteran’s Story - Godman666 | tZwaPDqXTgs | 42:18 | 214M |
| DEF CON 33 - Cash, Drugs, and Guns - Why Your Safes Aren't Safe - Mark Omo, James Rowley | N3SXVOVUD1s | 41:54 | 140M |
| DEF CON 33 - China's 5+ year campaign to penetrate perimeter network defenses - Andrew Brandt | MsRo12h0mrg | 35:11 | 119M |
| DEF CON 33 - China's Health Sector Ambitions and Info Needs - Amelia Shapiro | bp4E9ri5Xd4 | 25:08 | 101M |
| DEF CON 33 - Client or Server? Hidden Sword of Damocles in Kafka - Ji'an Zhou, Ying Zhu, ZiYang ' Li | Sa6Onq53TsY | 34:12 | 122M |
| DEF CON 33 - Cloned Vishing : A case study - Katherine Rackliffe | JPCKg_3XLP8 | 18:53 | 109M |
| DEF CON 33 - Conjuring Hardware Failures for Cross-ring Privilege Escalation - Christopher Domas | B6dC_KVLn6Q | 45:02 | 235M |
| DEF CON 33 - Context Aware Anomaly Detection in Automotive CAN Without Decoding - Ravi Rajput | VchCd-o25z0 | 18:41 | 60M |
| DEF CON 33 - Countering Forensics Software by Baiting Them - Weihan Goh, Joseph Lim & Isaac Soon | nUh9GVVhjD8 | 23:04 | 122M |
| DEF CON 33 - Creating a Virtual Ship Environment Optimized for Cybersecurity Use - Jeff Greer | WHD8NAY9BhU | 23:00 | 94M |
| DEF CON 33 - Critically Neglected: Cybersecurity for buildings - Thomas Pope | -ElW725i8z4 | 23:12 | 127M |
| DEF CON 33 - Crossing the Line: Advanced Techniques to Breach the OT DMZ - Christopher Nourrie | Qf7oNWKGL2I | 17:20 | 67M |
| DEF CON 33 - Cryptocurrency Opening Keynote - Michael Schloh MsvB, Chad Calease & Param D Pithadia | 6fPUzKlZDfA | 25:28 | 101M |
| DEF CON 33 - Cryptocurrency Weekend Keynote Chelsea Button, Alfonso Tinoco & Elaine Shi | BGuaIun8qiA | 25:40 | 86M |
| DEF CON 33 - CTRAPS-CTAP Impersonation, API Confusion Attacks on FIDO2 - M Casagrande, D Antonioli | WZChYxX5i_I | 37:25 | 245M |
| DEF CON 33 - Cyber Volunteering&Community Defense 1 yr in - DC Franklin - S Powazek, J Braun, A Ogee | LdiawBeYOCc | 45:31 | 246M |
| DEF CON 33 - Cybersecurity in Latin America - Stories of Resilience & Innovation - Giovanni Forero | br2RPtCOzB0 | 17:10 | 75M |
| DEF CON 33 - Dark Capabilities - When Tech Companies Become Threat Actors - Greg Conti, Tom Cross | I5N7Ro-aTh4 | 38:33 | 135M |
| DEF CON 33 - Data Duplication Village - Fungible Threats - Mauro Edritch, Nelson Colon | tAKcNZNxy5g | 32:03 | 242M |
| DEF CON 33 - Data Duplication Village - Tracking 300K+ Drives - | 4TZ3F5bv2T0 | 01:00:00 | 501M |
| DEF CON 33 - DC101 Panel - Alethe Denis, Nikita Kronenberg , zziks, Nicole Schwartz, Nina Alli | ia-LpnWwc8Y | 35:08 | 402M |
| DEF CON 33 - DDoS: The Next Generation - Andrew Cockburn | VlOUGECw6kc | 38:13 | 285M |
| DEF CON 33 - Dead Reckoning: Hijacking Marine Autopilots - Carson Green & Rik Chatterjee | tFrZ75IECjg | 20:30 | 119M |
| DEF CON 33 - Deepfake Image and Video Detection - Mike Raggo | GPqL9_muXJA | 48:46 | 141M |
| DEF CON 33 - Defending Reddit at Scale - Pratik Lotia & Spencer Koch | yGYR-tE0ljw | 26:27 | 120M |
| DEF CON 33 - Designing and Participating in AI Bug Bounty Programs - Dane Sherrets, Shlomie Liberow | e109g1uauCg | 51:53 | 240M |
| DEF CON 33 - Don’t Cry Wolf: Evidence based assessments of ICS Threats - Jimmy Wylie & Sam Hanson | 6U_CepoMSl4 | 23:55 | 103M |
| DEF CON 33 - Elevators 101 - Bobby Graydon, Ege Feyzioglu | LrzGrp8L1XI | 36:44 | 199M |
| DEF CON 33 - Emulating Embedded Linux Devices at Scale w LightTouch Firmware Rehosting - S Polke | f-LTMUFQzjQ | 38:27 | 132M |
| DEF CON 33 - Escaping the Privacy Sandbox wClientside Deanonymization Attacks - Eugene Lim | -oaH8XE_yMQ | 34:38 | 198M |
| DEF CON 33 - Escaping the Privacy Sandbox with Client Side Deanonymization Attacks - Eugene Lim | cFFhHXPsilw | 25:56 | 153M |
| DEF CON 33 - Evolution of Drain Attacks - Utvecklas & George | Y3IohAauLfE | 21:23 | 70M |
| DEF CON 33 - Examining Access Control Vulnerabilities in GraphQL: A Feeld Case Study - Bogdan Tiron | mPo-an8BUXc | 25:19 | 89M |
| DEF CON 33 - Exploiting Security Side Channels in E2E Encrypted Msngrs - G Gegenheuber, M Gunther | BgneDTH81EY | 40:42 | 177M |
| DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh | O7BI4jfEFwA | 48:22 | 132M |
| DEF CON 33 - Fear vs Physics: Diagnosing Grid Chaos - Emma Stewart | 930l_omgN1w | 20:04 | 114M |
| DEF CON 33 - Fighting a Digital Blockade: View from Taiwan - Herming Chiueh, Jason Vogt, Frank Smith | CvMVJjPcusI | 38:33 | 251M |
| DEF CON 33 - Finding and Exploiting Kernel Vulnerabilities in the eBPF Subsystem - Agostino Panico | TXs5F-7-2aE | 36:01 | 174M |
| DEF CON 33 - Fingerprint-Based Bot Blocking & Dynamic Deception - Adel Karimi | G7twgn-gi9k | 43:18 | 146M |
| DEF CON 33 - Fingerprinting Maritime NMEA2000 Networks - Constantine Macris TheDini & Anissa Elias | LbIAmMXCjZ0 | 25:33 | 124M |
| DEF CON 33 - Firmware Decryption: For, and By, the Cryptographically Illiterate - Craig Heffner | TcxVExGxEtk | 20:53 | 402M |
| DEF CON 33 - From Pwn to Plan: Turning Physical Exploits Into Upgrades - Shawn | NURO3NgtXUQ | 55:43 | 239M |
| DEF CON 33 - From Shanghai to the Shore: Threats in Global Shipping -K Miltenberger, N Fredericksen | ohre4ObUzoo | 20:47 | 92M |
| DEF CON 33 - Full Disclosure, Full Color: Story of This Year's BBV Badge - Abhinav Pandagale | PYFssJoDP1c | 24:37 | 109M |
| DEF CON 33 - Game Hacking 101 - Julian 'Julez' Dunning | XSzXaD6A73s | 39:56 | 176M |
| DEF CON 33 - Gateways to Chaos - How We Proved Modems Are a Ticking Time Bomb - Chiao-Lin Yu | kItqWJHN_dI | 39:43 | 133M |
| DEF CON 33 - Ghost Calls - Abusing Web Conferencing for Covert Command & Control - Adam Crosser | YVoF_mI8MIw | 42:04 | 219M |
| DEF CON 33 - Go Malware Meets IoT - Challenges, Blind Spots, and Botnets - Asher Davila | TtPicirB6G4 | 47:36 | 227M |
| DEF CON 33 - Gold Bug - Puzzle Panel with Friends - The Gold Bug Team 2025 | V_w5u9lONN0 | 53:47 | 270M |
| DEF CON 33 - Hacker Jeopardy Friday | G6WNcAK29hw | 01:56:19 | 1G |
| DEF CON 33 - Hacker Jeopardy Saturday | 5gGUh9-oPhk | 01:38:31 | 1G |
| DEF CON 33 - Hacker v. Triage - Inside Bug Bounty Battleground - Richard Hyunho Im, Denis Smajlović | D6p8-XAHOJU | 46:45 | 203M |
| DEF CON 33 - Hacking a head unit with malicious PNG - Danilo Erazo | QKHJZ1K-7p0 | 23:50 | 109M |
| DEF CON 33 - Hacking Context for Auto Root Cause and Attack Flow Discovery - Ezz Tahoun | k2r3JrodFaI | 01:03:45 | 298M |
| DEF CON 33 - Hacking Hotel Locks: The Saflok Vulnerabilities Expanded -Noah Holland, Josh Stiebel | ZODLZuy6H4U | 38:04 | 191M |
| DEF CON 33 - Hacking OBD II Emissions Testing - Archwisp | jVkgYkZV8Co | 13:38 | 85M |
| DEF CON 33 - Hacking Space to Defend It: Generating IoBs with SPARTA - Brandon Bailey | UL_c4K5dTuc | 25:35 | 121M |
| DEF CON 33 - Hacking the Nautical Rules of the Road Turn Left for Global Pwnage - Amp & Data | WDPOk0GxxEo | 25:40 | 123M |
| DEF CON 33 - Help! Linux in my Webcam! (•_•) - Mickey Shkatov, Jesse Michael | rO785smLLrU | 41:25 | 214M |
| DEF CON 33 - Here and Now: Exploiting the Human Layer at the Right Moment - Daniel Isler | vvDostysRAU | 20:47 | 126M |
| DEF CON 33 - HoloConnect AI - From Space to Biohacking - Dr. Fernando De La Peña Llaca | NVr-rO4aJL4 | 13:55 | 59M |
| DEF CON 33 - How a vuln in dealer software could've unlocked your car - E Zveare, R Piyush | U1VKazuvGrc | 35:22 | 118M |
| DEF CON 33 - How AI + Hardware can Transform Point of Care Workflows - PamirAI | jVFOiYCBcvc | 20:44 | 80M |
| DEF CON 33 - How AI + Hardware can Transforming Point-of-Care Workflows - PamirAI | -5bArYeJ3sU | 12:52 | 58M |
| DEF CON 33 - How API flaws led to admin access to 1k+ USA dealers & control of yr car - Eaton Zveare | qNuS0rvqc8c | 22:26 | 67M |
| DEF CON 33 - How Computers Kill People: Marine Systems - Michael DeVolld & Austin Reid | s1-4KoND6wM | 21:04 | 111M |
| DEF CON 33 - How Extra Features In Contactless Payments Break Security, What We Can Do - Tom Chotia | _fGpR4Fqni0 | 35:03 | 370M |
| DEF CON 33 - How Not to IoT:Lessons in Security Failures - Zoltan "zh4ck" Balazs | TTdK1lbM5VI | 43:27 | 197M |
| DEF CON 33 - How NOT to Perform Covert Entry Assessments - Brent White, Tim Roberts | DNP_fHTMy84 | 55:51 | 198M |
| DEF CON 33 - How to Fake a Badge like a Pro: Counterfeiting Event Credentials - Russell Phillips | Wq09JxymiFQ | 21:21 | 164M |
| DEF CON 33 - How to secure unique ecosystem shipping 1 billion+ cores? - Adam Zabrocki, Marko Mitic | KhWtkZmOPn4 | 37:05 | 136M |
| DEF CON 33 - HTTP 1 1 Must Die! The Desync Endgame - James 'albinowax' Kettle | PUCyExOr3sE | 36:31 | 138M |
| DEF CON 33 - Hull Integrity: Applying MOSAICS to Naval Mission Systems - Michael Frank | A6AkQrXDgQ4 | 14:10 | 54M |
| DEF CON 33 - Incident Response from a Maritime Sysadmin’s War Room - Kit Louttit, Steve Winston | o6-H-3Sx6i0 | 26:42 | 127M |
| DEF CON 33 - Infecting the Boot to Own the Kernel - Alejandro Vazquez, Maria San Jose | iS0XJVyxA3M | 39:28 | 181M |
| DEF CON 33 - Inside Look at a Chinese Operational Relay Network - Michael Torres, Zane Hoffman | e93V9TWnxJo | 33:32 | 163M |
| DEF CON 33 - Intro to Common Industrial Protocol Exploitation - Trevor Flynn | S7mPcEPaKHU | 23:24 | 127M |
| DEF CON 33 - Intro to Physical Security Bypass - Karen Ng, Matthew Cancilla | tTAISQqmxWQ | 57:03 | 153M |
| DEF CON 33 - Investigating Threat Actor Targeting Researchers, Academics - C Tafani-Dereeper, M Muir | iTGnoDEYlog | 35:39 | 160M |
| DEF CON 33 - Invoking Gemini Agents with a Google Calendar Invite - Ben Nassi, Or Yair, Stav Cohen | CUxbDRR0A8I | 45:36 | 214M |
| DEF CON 33 - Journey to the center of PSTN - I became a phone company. You should too - Enzo Damato | cA-ZQJ8EZSs | 44:22 | 170M |
| DEF CON 33 - Kill Chain Reloaded: Abuse legacy paths fr stealth persistence - A Hernando, B Martinez | 6D29iw3B2nM | 43:05 | 181M |
| DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - Carl Miller, Chris Monteiro | cYZmRp90hss | 32:55 | 119M |
| DEF CON 33 - Killing Killnet - Alex Holden | wVY47hNzgJk | 21:48 | 133M |
| DEF CON 33 - Let AI Autogenerate Neural ASR Rules for OT Attacks via NLP - Mars Cheng & Jr Wei-Huang | MJV5FQztfi4 | 22:03 | 84M |
| DEF CON 33 - Letthemin: Facilitating High Value Purple Teams Using Assumed Compromise - Sarah Hume | xM8nodIw1_E | 27:37 | 176M |
| DEF CON 33 - Live Music - Friday Night - Daemon Chadeau | DyVM3bImh_c | 59:39 | 994M |
| DEF CON 33 - Live Music - Friday Night - Elipscion | 0DJy7oDbJCs | 58:42 | 693M |
| DEF CON 33 - Live Music - Saturday Night - 0xdade | PbXdFEkc4ns | 28:53 | 481M |
| DEF CON 33 - Live Music - Saturday Night - DJ null | QECf5jCM6yw | 05:32 | 95M |
| DEF CON 33 - Live Music - Saturday Night - Dual Core | YAH_aNsCf4g | 35:20 | 763M |
| DEF CON 33 - Live Music - Thursday Night - Fling | 8_wMwOnGP1Q | 53:55 | 886M |
| DEF CON 33 - Live Music - Thursday Night - Heckseven | MnxM0O0jQso | 44:13 | 837M |
| DEF CON 33 - LLM Identifies Info Stealer Vector & Extracts IoCs -Olivier Bilodeau, Estelle Ruellan | PHtTXqlViVk | 49:49 | 365M |
| DEF CON 33 - Loading Models, Launching Shells: Abusing AI File Formats fr Code Execution - C Parzian | IHzn9BiH6rY | 18:40 | 65M |
| DEF CON 33 - Locked Down, Not Locked Out: How I Escaped Yr Secure Operator Workstation - Aaron Boyd | 0r_trFFPVYc | 24:35 | 99M |
| DEF CON 33 - Making the DEF CON 33 Badge - Mar | y8kbuGgH2eQ | 12:15 | 89M |
| DEF CON 33 - Man in the Malware: Intercepting Adversarial Communications - Ben 'polygonben' Folland | lv-hua5b_9s | 33:07 | 145M |
| DEF CON 33 - Managing Bug Bounties @ Scale - Gabriel Nitu, Jay Dancer, PayPal, Ryan Nolette & Goshak | YKHs2XJWmXU | 58:42 | 526M |
| DEF CON 33 - Mastering Apple Endpoint Security for Advanced macOS Malware Detection - Patrick Wardle | AgYGwZjcsLo | 51:46 | 351M |
| DEF CON 33 - Metal-as-a-Disservice: Exploiting Legacy Flaws in Cutting Edge Clouds - Bill Demirkapi | EtGhHCr3VLE | 46:16 | 207M |
| DEF CON 33 - Mind the Data Voids: Hijacking Copilot Trust - Tobias Diehl | NgjyBKfqJEs | 19:28 | 120M |
| DEF CON 33 - Modern Odometer Manipulation - collin & oblivion | FYHvL8V_m-Q | 26:20 | 90M |
| DEF CON 33 - Moonlight Defender : Purple Teaming in Space! - Ben Hawkins | NHvvrhFU6XQ | 20:50 | 111M |
| DEF CON 33 - Navigating the Invisible - Mehmet Onder Key, Furkan Aydogan | JgKUrRaKo7o | 13:42 | 64M |
| DEF CON 33 - Never enough about cameras: Firmware keys hidden under the rug - Alexandru Lazar | N4Cnso2Vbmw | 26:11 | 135M |
| DEF CON 33 - New Red Team Networking Techniques for Initial Access and Evasion -Shu-Hao, Tung 123ojp | mdFRLCnACJM | 42:23 | 163M |
| DEF CON 33 - No Brain No Gain - Mehmet Önder Key, Temel Demir & Dr Ahmet Furkan Aydogan | _ENNd1XMPyk | 56:58 | 227M |
| DEF CON 33 - No Spook Leaves Randomness to Chance - Shaanan Cohney | OYGtNa0pJec | 54:57 | 371M |
| DEF CON 33 - No VPN Needed? Cryptographic Attacks Against the OPC UA Protocol - Tom Tervoort | dFYR2oOK8wg | 36:19 | 166M |
| DEF CON 33 - Not Just a Pipeline Leak: Reconstructing Real Attack Behind tj-actions - Aviad Hahami | -CSbWpj_IZM | 42:08 | 165M |
| DEF CON 33 - Off Grid Datarunning in Oppresive Regimes: Sneakernet and Pirate Box - Robert Menes | DJHiSbPskHc | 18:56 | 76M |
| DEF CON 33 - One Key, Two Key, I Just Stole Your goTenna Key - Erwin 'Dollarhyde' Karincic, Woody | DvtFoREyB0A | 42:48 | 252M |
| DEF CON 33 - One Modem to Brick Them All -Vulns in EV Charging Comms - Jan Berens, Marcell Szakaly | SQz4nySj4hg | 43:23 | 81M |
| DEF CON 33 - Operational Twilight: APTs, OT, & geopolitics of a dying climate - Cybelle Oliveira | Ekp5iMPEgVw | 23:46 | 143M |
| DEF CON 33 - Orion: Fuzzing Workflow Automation - Max Bazalii, Marius Fleischer | NbWDhk-9k_k | 44:21 | 372M |
| DEF CON 33 - OSINT Enabled Ghost Mode: Counter Surveillance for Everyday People - Desiree Wilson | 9-a4OhOChss | 21:49 | 94M |
| DEF CON 33 - OverLAPS: Overriding LAPS Logic - Antoine Goichot | stGRkxldg-U | 21:19 | 78M |
| DEF CON 33 - Passing the Torch - Mentoring and Protecting Our Students - Navaar Johnson, Sam Comini | AviifoOuaBE | 54:52 | 205M |
| DEF CON 33 - Passkeys Pwned:Turning WebAuthn Against Itself - S Pratap Singh, J Lin, D Seetoh | GG4gAhbhPH8 | 33:39 | 122M |
| DEF CON 33 - Paywall Optional: Stream for Free w⧸ New Technique, RRE - Farzan Karim | UdNhZ17t8M4 | 20:18 | 94M |
| DEF CON 33 - Pirates of the North Sea - John Andre Bjørkhaug- | _fXLWaP4Zmo | 23:43 | 133M |
| DEF CON 33 - Planting C4: Cross Compatible External C2 for Your Implants - Scott Taylor | O0-0u4zJWEM | 16:22 | 54M |
| DEF CON 33 - Playing Dirty w⧸o Cheating - Getting Banned for Fun - S Collins, M Muench, T Chothia | FXIScbxJTZw | 38:37 | 135M |
| DEF CON 33 - Policy Preview | eBkduAj_Ruc | 01:23 | 16M |
| DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis | OkVYJx1iLNs | 39:29 | 115M |
| DEF CON 33 - Pre-Auth RCE, Arbitrary SMS & Adjacent Attacks on 5G and 4G_LTE Routers - Edward Warren | Rxx07Ubmcuc | 27:13 | 203M |
| DEF CON 33 - Preventing One of The Largest Supply Chain Attacks in History - Maksim Shudrak | Iv6VyOaG22c | 37:58 | 212M |
| DEF CON 33 - Preventing One of The Largest Supply-Chain Attacks in History - Maksim Shudrak | jraaS3lUP0I | 37:58 | 227M |
| DEF CON 33 - Private, Private, Private Access Everywhere - Meghan Jacquot | luZgICpW0Kw | 29:31 | 113M |
| DEF CON 33 - Prompt Scan Exploit AI’s Journey Through 0Days and 1000 Bugs - D. Jurado & J. Nogue | sOkgHfu4lXY | 21:38 | 83M |
| DEF CON 33 - QRAMM: The Cryptographic Migration to a Post Quantum World - Emily Fane, Abdel Sy Fane | SfWOqqDZEWI | 22:29 | 429M |
| DEF CON 33 - Quantum Resistant Healthcare - Katarina Amrichova | KpxHU5NPsPk | 28:23 | 108M |
| DEF CON 33 - Quiet Confidence An Introvert's Journey to Technical Public Speaking - Emma Fang | CUQGpoko8_0 | 19:46 | 84M |
| DEF CON 33 - RATs & Socks abusing Google Services - Valerio 'MrSaighnal' Alessandroni | cXZJlKLBBGE | 15:58 | 73M |
| DEF CON 33 - Real Exploits, Testbed Validation, Policy Gaps in Maritime Connectivity - Juwon Cho | Wc9GPvu-Yso | 24:37 | 105M |
| DEF CON 33 - Rebadged, Relabeled, Rooted: Pwnage via Solar Supply Chain - Anthony Rose, Jake Krasnov | aKCSoAtxEHc | 32:33 | 246M |
| DEF CON 33 - Reclaim Tech: A Community Movement - Janet Vertesi, Andy Hull | twi2m77YxQ0 | 19:11 | 82M |
| DEF CON 33 - ReclaimTech: A community movement - Janet Vertesi, Andy Hull | Yr3SzRHmIxk | 25:08 | 132M |
| DEF CON 33 - Reconfigurable HSMs: Future Proofing Hardware Security - Pablo Trujillo | 9slY1DllYhw | 24:59 | 104M |
| DEF CON 33 - Recording PCAPs from Stingrays With a $20 Hotspot - Cooper Quintin, oopsbagel | meC2JqNAbCA | 39:51 | 145M |
| DEF CON 33 - Red Russians: How Russian APT groups follow offensive security research - Will Thomas | bpUxuOdfGHM | 24:17 | 115M |
| DEF CON 33 - Red Teaming Space: Hacking the Final Frontier - Tim Fowler | KjDaPwtYte4 | 24:31 | 114M |
| DEF CON 33 - Redefining Purple Teaming for Max impact - A Pennington, S Marrone, L Proehl | wU7xaXDupZo | 40:50 | 562M |
| DEF CON 33 - Referral Beware, Your Rewards Are Mine - Whit @un1tycyb3r Taylor | tQRE9U1q2mk | 24:32 | 119M |
| DEF CON 33 - Regex For Hackers - Adam 'BuildHackSecure' Langley, Ben 'nahamsec' Sadeghipour | mYC-rQ-HZaw | 50:08 | 218M |
| DEF CON 33 - Remote code execution via MIDI messages - Anna Antonenko | 87Ce_D8T7oI | 39:18 | 118M |
| DEF CON 33 - Resilient & Reconfigurable Maritime Comms - Avinash Srinivasan, Brien Croteau | N0XFOS1kHaM | 24:47 | 109M |
| DEF CON 33 - ReVault! Compromised by your Secure SoC - Philippe Laulheret | SRALfyEspms | 42:00 | 197M |
| DEF CON 33 - Reverse Engineering Marine Engines: Make powerboats do your bidding - Alex Lorman | AYi5mEWAHzY | 24:33 | 171M |
| DEF CON 33 - Reversing approaches to extract embedded scripts in macOS malware - Patrick Wardle | BvRZHRlMsoU | 21:21 | 122M |
| DEF CON 33 - RF Village - Small Packet of Bits That Can Save or Destabilize a City - Manuel Rabid | 3C-_TaYht68 | 46:38 | 764M |
| DEF CON 33 - RF Village - Warflying in a Cessna, Part II -Matthew Thomassen, Sean McKeever | KwI2daso3ug | 24:41 | 420M |
| DEF CON 33 - RF Village - You might be a Wardriver if - MrBill, CoD_Segfault | PsfM_ZDgffU | 14:17 | 197M |
| DEF CON 33 - RF Village - Airborne WiFi: Rogue Waves in the Sky - m0nkeydrag0n | 9iXHZHwc2MY | 26:11 | 373M |
| DEF CON 33 - RF Village - Layer 2 Liberation: Things Your AP Never Dreamed Of - Allan Riordan Ball | B6_my_bDSx0 | 25:04 | 454M |
| DEF CON 33 - RF Village - McJumpBox Leveraging free corporate Wifi for fun⧸profit - Loaning | RpkYQDaEKMo | 44:38 | 381M |
| DEF CON 33 - RF Village - Meshtastic Command & Control - Eric Escobar | -e9V_hlWlVo | 39:11 | 732M |
| DEF CON 33 - RF Village - Meshtastic Under the Microscope From Chirps to Chat - Allan Riordan Ball | SM1XSxP6W78 | 28:41 | 148M |
| DEF CON 33 - RF Village - Open Source Cellular Test Beds for the EFF Rayhunter - Ron Broberg | RkIz4VcsEdo | 26:26 | 395M |
| DEF CON 33 - RF Village - Running a Software Defined Radio CTF using challengectl - Dan Perret | 98_3eRPuuYM | 40:11 | 483M |
| DEF CON 33 - RF Village - So What The Heck Is This Radio Stuff Anyway - Exploding Lemur | v76lYD5odfA | 43:24 | 275M |
| DEF CON 33 - RF Village - Tactical Flipper Zero You Have 1 Hour and No Other Equipment - Grey Fox | b8-uDKkfw5c | 34:40 | 184M |
| DEF CON 33 - RF Village - The dirty laundry of stored value washing cards - Aidan Nakache, Equip | BNOmouHeAOw | 30:57 | 508M |
| DEF CON 33 - Rusty pearls: Postgres RCE on cloud databases - Tal 'TLP' Peleg, Coby Abrams | eroPf1N-pAk | 18:30 | 144M |
| DEF CON 33 - Safeguarding the Industrial Frontier OT SOC & Incident Response - Adam Robbie | AXN3sTAr9R4 | 20:06 | 105M |
| DEF CON 33 - Satellite Networks Under Siege: Cybersecurity Challenges of Targeted DDoS - Roee Idan | xMfXqtcni_I | 24:15 | 159M |
| DEF CON 33 - Scamming Scammers - Weaponizing OSS Against Pig Butchering, Organized Crime - Erin West | 0KGhP4qjmXk | 53:58 | 355M |
| DEF CON 33 - SCCM: The tree that always bears bad fruits - Mehdi 'kalimer0x00' Elyassa | epyI3b8Vl0M | 38:56 | 149M |
| DEF CON 33 - Secure Code Is Critical Infrastructure: Hacking Policy for Public Good - Tanya Janca | 3V-URruNQck | 29:20 | 143M |
| DEF CON 33 - Secure software dependency management everywhere with Nix - Tom Berek, Farid Zakaria | xecOnPOxc3w | 53:01 | 908M |
| DEF CON 33 - Securing Agentic AI Systems and Multi-Agent Workflows - Andra Lezza, Jeremiah Edwards | 5fJ6u--GkSk | 33:46 | 100M |
| DEF CON 33 - Shaking Out Shells with SSHamble - HD Moore | XHoH4ic8fX8 | 20:27 | 123M |
| DEF CON 33 - Silent Leaks: Harvesting Secrets from Shared Linux Environments - Cernica Ionut Cosmin | ig8ZMiPwrAw | 19:57 | 83M |
| DEF CON 33 - Siriously Leaky: Exploring Overlooked Attack Surfaces in Apple's Ecosystem - Richard Im | MWvpOW-PRJI | 45:07 | 196M |
| DEF CON 33 - Smart Bus Smart Hacking: Free WiFi to Total Control - Kai Ching Wang, Chiao-Lin Yu | AOp0QtUORBc | 21:05 | 140M |
| DEF CON 33 - Smart Devices, Dumb Resets:Testing Firmware Persistence in Commercial IoT - Matei Jose | rLnlLLKISyY | 28:54 | 124M |
| DEF CON 33 - So Long, and Thanks for All the Phish - Harrison Sand, Erlend Leiknes | tJ4tG7nRUyU | 36:09 | 189M |
| DEF CON 33 - So you want to make a badge? Badge Creation 101 - Jeff Geisperger | e6dmGupBsJk | 33:52 | 189M |
| DEF CON 33 - Sometimes you find bugs, sometimes bugs find you - Jasmin Landry JR0ch17 | Tglq1WT1wpA | 25:54 | 64M |
| DEF CON 33 - SSH Honeypots and Walkthrough Workshops: A History - Ryan Mitchell | TXUSC5YEDPo | 34:44 | 130M |
| DEF CON 33 - SSH-nanigans - Busting Open the Mainframes Iron Fortress through Unix - Philip Young | J3f9axtJsCw | 46:24 | 312M |
| DEF CON 33 - State of Open Source in the Federal Government - Jordan Kasper | S_Ly_eXY65k | 37:01 | 276M |
| DEF CON 33 - State of the Pops: Mapping the Digital Waters - Vlatko Kosturjak & MJ Casado | mVqNxvfaVGg | 27:44 | 141M |
| DEF CON 33 - Stories from a Tor dev - Roger 'arma' Dingledine | djM70O0SnsY | 42:47 | 266M |
| DEF CON 33 - Take all my money – penetrating ATMs - Fredrik Sandstom | auoEA8ZD8YA | 24:05 | 113M |
| DEF CON 33 - The 2025 Pwnie Awards - Ian Roos, Mark Trumpbour | Gpx6JsZ0Vzw | 36:34 | 380M |
| DEF CON 33 - The Anatomy of a Crypto Scam - Nick Percoco & Kitboga | uLpCI6CV3Uw | 55:36 | 158M |
| DEF CON 33 - The depths that marketers will plummet to - 4dw@r3 | arvFqkI4770 | 21:10 | 84M |
| DEF CON 33 - The Ghost of Internet Explorer in Windows - George Hughey, Rohit Mothe | 8cb_OF_6Ek8 | 44:17 | 250M |
| DEF CON 33 - The PowerPoint Glove - Parsia Hakimian | SJ-kfVUoENk | 23:21 | 153M |
| DEF CON 33 - The Things know What You Did Last Session - Will Baggett | HqNgsnO5IoU | 23:25 | 103M |
| DEF CON 33 - The Ultimate Hack : Applying Lessons Learned from the loss of TITAN - John Mauger | dmgjTGuAo38 | 20:15 | 119M |
| DEF CON 33 - The UnRightful Heir My dMSA Is Your New Domain Admin - Yuval Gordon | ftNaF20RWt4 | 33:34 | 225M |
| DEF CON 33 - The Worst ICS OT Love Story Ever Told - Mike Holcomb | ruVlunKr4BY | 26:53 | 102M |
| DEF CON 33 - The Worst ICS⧸OT Love Story Every Told - 2025 Mike Holcomb | iVmS5dPjggU | 26:07 | 102M |
| DEF CON 33 - There and Back Again: Detecting OT Devices Across Protocol Gateways - Rob King | YBPYYk8FIkc | 21:53 | 127M |
| DEF CON 33 - They deployed Health AI on us: We’re bringing the rights & red teams - Andrea Downing | VT-xl42KIpI | 26:19 | 94M |
| DEF CON 33 - Thinking Like a Hacker in the Age of AI - Richard 'neuralcowboy' Thieme | t3bKDBtdSw8 | 47:31 | 856M |
| DEF CON 33 - Thinking like an attacker is no longer optional - Abhijith 'Abx' B R, Keenan Skelly | PZLmzbyYs2g | 36:43 | 459M |
| DEF CON 33 - Third Party Access Granted : Postmortem on Student Privacy - Sharlene Toney | 06CZrbjy9qM | 36:05 | 153M |
| DEF CON 33 - Threat Dynamics on the Seas - John Mauger, & Michael Sulmeyer & Adam Segal | HJYTMhbtKVU | 41:19 | 283M |
| DEF CON 33 - TotalTest Simulations 2 Oh! From Exploits to Economics - Nebu Varghese | 2EYYmncELXs | 25:32 | 123M |
| DEF CON 33 - TSPU: Russia's Firewall and Defending Against Digital Repression - Benjamin Mixon-Baca | zcdEX1ZgXzY | 41:23 | 204M |
| DEF CON 33 - Tunnelpocalypse - Rich Compton | qjyMK_OBgzQ | 28:11 | 135M |
| DEF CON 33 - Turning Camera Surveillance on its Axis - Noam Moshe | wclvPznv5v4 | 21:54 | 43M |
| DEF CON 33 - Turning Camera Surveillance on its Axis - Noam Moshe | wM8kOq4VVt8 | 21:28 | 79M |
| DEF CON 33 - Turning Microsoft's Login Page into our Phishing Infrastructure - Keanu 'RedByte' Nys | B4pVpByWOcI | 42:58 | 221M |
| DEF CON 33 - Turning your Active Directory into the attacker’s C2 - Quentin Roland, Wilfried Bécard | _l9_lNUCjP4 | 43:05 | 264M |
| DEF CON 33 - Uncovering the Secrets of Tire Pressure Monitoring Systems - Yago Lizarribar | K5Kltw5kQpM | 25:57 | 82M |
| DEF CON 33 - Unmasking the Snitch Puck: IoT surveillance tech in the school bathroom - Reynaldo, nyx | WCnojaEpF2I | 40:04 | 131M |
| DEF CON 33 - Unveiling IoT Vulns: From Backdoors to Bureaucracy - Kai-Ching Wang, Chiao-Lin Yu | L4cMPw2uDtc | 19:45 | 92M |
| DEF CON 33 - Unveiling the Perils of the TorchScript Engine in PyTorch - Ji'an Zhou, Lishuo Song | iVerhbedK_0 | 34:46 | 116M |
| DEF CON 33 - VDP in Aviation How it shouldn't be done! - Matt Gaffney | oI3zxDWldKE | 21:27 | 220M |
| DEF CON 33 - Veilid la revoluçion : Your data is yours to own - Katelyn Bowden & Paul Miller | C8F5kvm2B5s | 23:06 | 183M |
| DEF CON 33 - Vibe School: Making dumb devices smart with AI - Dr Katie Paxton Fear | CM_8gKlz2-o | 22:27 | 111M |
| DEF CON 33 - Virtualization Based Insecurity: Weaponizing VBS Enclaves - Ori David | DqC4LZTTCa0 | 36:29 | 165M |
| DEF CON 33 - Voice Cloning Air Traffic Control: Vulnerabilities at Runway Crossings - Andrew Logan | JKwxsGYcZq4 | 22:38 | 97M |
| DEF CON 33 - Voting Village - DMCA Security Research Exemption and Election Security - Tori Noble | XVJd08ehNs4 | 55:24 | 301M |
| DEF CON 33 - Voting Village - It's Not Safe Yet: Online Voting in Practice - Michael Specter | g0GXWp4QmAs | 36:04 | 174M |
| DEF CON 33 - Voting Village - A NY Legal Challenge to ExpressVote XL's Barcode Use - Susan Lerner | edxqLUizSWE | 20:54 | 202M |
| DEF CON 33 - Voting Village - A Review of Post Election Audits in Swing States - Susan Greenhalgh | 5mWnGZWUEMQ | 28:29 | 153M |
| DEF CON 33 - Voting Village - CARVER Vuln Analysis & US Voting System - Moore, Young, Baggett | rqMNllTo6wc | 44:27 | 388M |
| DEF CON 33 - Voting Village - History and Significance of the TTBR and PEASWG - Debra Bowen | F_Xz9rMgWzE | 55:47 | 276M |
| DEF CON 33 - Voting Village - Is E2E Verifiability a Magic Bullet for Online Voting - John Odum | gMvNKsl65NA | 27:35 | 157M |
| DEF CON 33 - Voting Village - Reflections on TTBR & Everest - Bowen, Blaze, Clark, Hoke, Mulligan | eRW2YjY0QuM | 29:01 | 221M |
| DEF CON 33 - Voting Village - Regulatory Failures with Ballot Marking Devices - Marnie Mahoney | y1zZtEm_rvk | 27:48 | 171M |
| DEF CON 33 - Voting Village - When Insiders Are the Threat - Burbank, Greenhalgh, Marks, Jefferson | OyUNja7QSv8 | 57:57 | 345M |
| DEF CON 33 - Voting Village - When the Paper Trail Leads Nowhere - Ian Patton | URWjVRUDNiI | 26:34 | 201M |
| DEF CON 33 - Voting Village - "Fortress Island" Physical Security in Voting Systems - Drew Springall | yvbe6n82f0I | 33:32 | 282M |
| DEF CON 33 - Voting Village- Evidence Based Elections and Software Independence - Ron Rivest | 8rIM5aTApKo | 44:00 | 235M |
| DEF CON 33 - Vulns to end your space mission - A. Olchawa, M. Starcik, R. Fradique & A.Boulaich | TAtG8rofxxE | 17:32 | 68M |
| DEF CON 33 - Welcome to DEF CON 33 - The Dark Tangent | Eo5lwnTft8U | 21:45 | 323M |
| DEF CON 33 - What Game Hackers teach us about Offensive Security & Red Teaming - Joe 'Juno' Aurelio | zfhiZnjJLT4 | 30:08 | 125M |
| DEF CON 33 - What is Dead May Never Die: The Immortality of SDK Bugs - Richard Lawshae | MTZ9_IfZ7Bk | 12:05 | 177M |
| DEF CON 33 - What’s Really in the Box? The Case for Hardware Provenance and HBOMs - Allan Friedman | QARwgoJ-IbA | 24:22 | 201M |
| DEF CON 33 - Where’s My Crypto, Dude? The Ultimate Guide to Crypto Money Laundering - Thomas Roccia | 1uNneo9L_jU | 30:02 | 100M |
| DEF CON 33 - Whose Slide Is It Anyway? | i-wKxAAeWt8 | 39:25 | 696M |
| DEF CON 33 - Win-DoS Epidemic - Abusing RPC for Win-DoS & Win-DDoS - Or Yair, Shahak Morag | JLMsfH2MVCE | 37:16 | 159M |
| DEF CON 33 - Winners of DARPA’s AI Cyber Challenge - Andrew Carney, Jason Roos, Stephen Winchell | touJ5uLlXjQ | 41:31 | 385M |
| DEF CON 33 - You snooze you lose: RPC Racer winning RPC endpoints against services - Ron Ben Yizhak | vBz8TBVxwk4 | 35:36 | 155M |
| DEF CON 33 - Your Passkey is Weak: Phishing the Unphishable - Chad Spensky, Ph D | xdl08cPDgtE | 24:12 | 110M |
| DEF CON 33 -BiC Village -Let's Lose the Shock: Mystery of Linux - A Pain Free Intro - DJ Davis | R_rpuLpfMZM | 55:49 | 269M |
| DEF CON 33 -BitUnlocker: Leverage Windows Recovery to Extract BitLocker Secrets - Leviev, Ben Simon | Cc6vrQSVMII | 38:26 | 106M |
| DEF CON 33 -Voting Village - Protecting Election Researchers Globally - Miracle Owolabi | 5qmpv44knF8 | 14:51 | 92M |
| DEF CON 33 3- Red teaming fraud prevention systems with GenAI - Karthik Tadinada, Martyn Higson | EiXbzVlNYro | 46:16 | 230M |
| DEF CON 33 BiC Village - Sydney Johns RE for the Rest of Us An Introduction to Reverse Engineering | h9ewUS6FTFQ | 41:00 | 224M |
| DEF CON 33 Preview - Aerospace Village Promo | T8w5M_RL-9c | 02:42 | 18M |
| DEF CON 33 Preview - AIXCC - Andrew Carney | lQDOIFZgBs4 | 03:04 | 41M |
| DEF CON 33 Preview - Cryptocurrency Preview | mHFcecX4RIA | 03:21 | 82M |
| DEF CON 33 Preview - Hardware Hacking Village | leKO6dphHBY | 03:03 | 15M |
| DEF CON 33 Preview - Malware Village | 6BIBQUmJgac | 02:38 | 10M |
| DEF CON 33 Recon Village - Mapping the Shadow War From Estonia to Ukraine - Evgueni Erchov | y-1_nKM8DRQ | 20:47 | 105M |
| DEF CON 33 Recon Village - CTI Agent Automated Battlecards from CTI Reports - Mohamed Nabeel | Y8xMr2JwyjU | 25:10 | 133M |
| DEF CON 33 Recon Village - Inside the Shadows Tracking RaaS Groups, Cyber Threats - John Dilgen | esKyHO5WjPU | 32:30 | 157M |
| DEF CON 33 Recon Village - Attack Surface in Motion - Muslim Koser | N7w6FklAmVA | 42:25 | 202M |
| DEF CON 33 Recon Village - Autonomous Video Hunter AI Agents for Real Time OSINT - Kevin Dela Rosa | oHjQSpcP664 | 23:21 | 72M |
| DEF CON 33 Recon Village - Building Local Knowledge Graphs for OSINT - Donald Pellegrino | yIUfntW_TxY | 41:11 | 184M |
| DEF CON 33 Recon Village - Discord OSINT - Zach Malinich | Xp4lWpD20Mo | 37:49 | 147M |
| DEF CON 33 Recon Village - enumeraite: AI Assisted Web Attack Surface Enumeration - Özgün Kültekin | IzsBS_E2RVY | 40:29 | 214M |
| DEF CON 33 Recon Village - How to Become One of Them: Deep Cover Ops - Sean Jones, Kaloyan Ivanov | aSOiPxOBs1E | 43:37 | 206M |
| DEF CON 33 Recon Village - Investigating Foreign Tech from Online Retailers - Michael Portera | MAtllbHmxP4 | 28:05 | 131M |
| DEF CON 33 Recon Village - OSINT & Modern Recon Uncover Global VPN Infrastructure - Vladimir Tokarev | 4HGFlZZfWc8 | 39:53 | 198M |
| DEF CON 33 Recon Village - OSINT Signals Pop Quiz - Master Chen | L-ZqeZbiWn8 | 26:19 | 152M |
| DEF CON 33 Recon Village - Plug and Prey Scanning and Scoring Browser Extensions - Nishant Sharma | WH6QRkoDlhk | 28:58 | 159M |
| DEF CON 33 Recon Village - Robin The Archaeologist of the Dark Web - Apurv Singh Gautam | P4p1PyEFzww | 20:12 | 113M |
| DEF CON 33 VIdeo - TeamHackerPager | Omfyox5kxUQ | 16:17 | 143M |
| DEF CON 33 Video Team - ICS Village Treatment Plant | D_3mUd7shX4 | 02:11 | 37M |
| DEF CON 33 Video Team - Illumicon | Taue9SWH3Os | 15:44 | 305M |
| DEF CON 33 Video Team - AIxCC 42 Beyond Bugs | Ov8GSLqoPvQ | 15:52 | 139M |
| DEF CON 33 Video Team - DEF CON RUN with Shepard and Panda | s9GM13q8ltY | 02:56 | 30M |
| DEF CON 33 Video Team - Andra Lezza on Being a DC Speaker | qYwZoW_dDtw | 03:43 | 46M |
| DEF CON 33 Video Team - Ch0wn35 | B2zAdGceCIQ | 04:04 | 64M |
| DEF CON 33 Video Team - Contest Update - Tiberius | q6ri2BTily4 | 06:00 | 31M |
| DEF CON 33 Video Team - Darren Kitchen Hak5 Pager | TPLRmpIbQuQ | 05:08 | 63M |
| DEF CON 33 Video Team - DDOS Community | sg120BaNHQI | 09:25 | 178M |
| DEF CON 33 Video Team - DEF CON NextGen | hkhuImaSXCs | 19:40 | 122M |
| DEF CON 33 Video Team - DEFCON AIxCC Lacrosse Team | YdJ6NoxzuKs | 15:54 | 160M |
| DEF CON 33 Video Team - Jordan Kasper on Open Source in Government | bsls-3hXH4M | 16:12 | 182M |
| DEF CON 33 Video Team - KevOps Sellout Pool Party at the Sahara | K8fjM9k_AUY | 02:29 | 45M |
| DEF CON 33 Video Team - Mar Williams | 3YT_tOKHSDA | 09:45 | 172M |
| DEF CON 33 Video Team - Mobile Hacking Community | nmYb3Znr4Gc | 09:18 | 179M |
| DEF CON 33 Video Team - Retro Tech Community & Badge Life LIVE - d3dbot x psyop x grrrizzzz | b5zL6IijpYA | 18:27 | 292M |
| DEF CON 33 Video Team - TipsyBadge | hKLow2hkLxQ | 05:00 | 79M |
| DEF CON 33 VIdeo Team -Hacker Hangout - Kari, DT, Silk | 073cCPvNit4 | 25:46 | 208M |
| DEF CON 33 Voting Village - Welcome and Introductions | YBcJEiP_k7k | 10:44 | 86M |
| DEF CON 33 Voting Village - Dominion ICX Simple Hacks Daunting Recoveries - Springall, Davis, Marks | gRU0-z1of2Y | 46:06 | 161M |
| DEF CON 7 - Gh0st - Phreaking and PBX tricks | N5aAu8CCQY0 | 51:56 | 86M |
| DEF CON 7 - Panel - Meet the Feds | w04oWPhecow | 56:10 | 94M |
| DEF CON 8 - Xs - LDAP | yif0EhykeMk | 37:42 | 81M |
| DEF CON 9 - Adam Bresson - Data Mining with PHP * | i8Wg0qiipcs | 41:09 | 255M |
| DEF CON 9 - Anders Ingeborn - Designing Small Payloads * | Vs3DgRL9qJM | 35:13 | 97M |
| DEF CON 9 - Anonymous - Credit Card Fraud * | yii9bT1Ytsc | 51:54 | 251M |
| DEF CON 9 - Barry Stiefel - NAT for Newbies and Not So Newbies * | eY_RYmfMRqI | 01:35:55 | 458M |
| DEF CON 9 - Biing Jong Lin - Survey of Country-Wide Web Server Security * | OQ23rPFUk2Y | 34:00 | 95M |
| DEF CON 9 - Brenno de Winter - IP V6 Security * | ZZSJnLd3PL0 | 31:58 | 85M |
| DEF CON 9 - Bruce Schneier Answers Questions * | Bk-kIfGf-iw | 58:19 | 161M |
| DEF CON 9 - Bryan Glancey - Weakest Link * | cVlFgHvtbjg | 01:05:26 | 303M |
| DEF CON 9 - Cult of the Dead Cow - Activism Panel * | 2ne2qxoyBv0 | 54:37 | 243M |
| DEF CON 9 - Cyberethical Survivor * | b2ZcGbPPrqQ | 01:18:25 | 354M |
| DEF CON 9 - Cyrus Peikari - An Open Source International Attenuated Computer Virus * | 1sD2YsVCzZQ | 42:36 | 144M |
| DEF CON 9 - Dan Kaminsky - Gateway Cryptography * | TAdD8mKvEnc | 48:09 | 223M |
| DEF CON 9 - Dario Diaz - Digital Millenium Copyright Act * | OcoXc2fny7w | 50:54 | 306M |
| DEF CON 9 - Dennis Salguero - The Business Side of Starting Your Own Consulting Firm * | WRa0filqk4w | 32:41 | 157M |
| DEF CON 9 - Enrique Sanchez - Distributed Intrusion Detection System Evasion * | U2kU2vcen-o | 31:40 | 86M |
| DEF CON 9 - Freaky - OSX and Macintosh Security * | ZdTvTF0Wf-0 | 47:21 | 169M |
| DEF CON 9 - FX - Attacking Control Routing and Tunneling Protocols * | -M37rdfDouo | 41:01 | 138M |
| DEF CON 9 - Ian Goldberg - Arranging an Anonymous Rendezvous * | EELxDct2gJw | 55:15 | 98M |
| DEF CON 9 - Jason Peel - Cypherpunk-Grade Covert Network Channels * | eeJ0VdWYz1M | 49:53 | 241M |
| DEF CON 9 - Jennifer Granick - European Cybercrime Treaty * | FXAMHrZY6k8 | 50:29 | 237M |
| DEF CON 9 - Jim Christy - Meet the FED Panel * | 9kQ7fLkf8tg | 01:00:20 | 326M |
| DEF CON 9 - K2 - Polymorphic Shell Code API * | 6Lya3B86Hks | 01:04:34 | 303M |
| DEF CON 9 - Keith Nugent - Windows 2000 Security: How to lock down your Win2k boxes * | buCb7iVkZA8 | 01:41:33 | 284M |
| DEF CON 9 - Kevin McPeake - Falling Dominos * | OuqD1daUz70 | 01:29:39 | 418M |
| DEF CON 9 - Len Sassaman - What is SSL a CA and FreeCert * | y3BAfiQN8Lk | 47:03 | 187M |
| DEF CON 9 - Marcus Andersson - Firewalling Wireless Devices * | eQM8_cWa0qI | 53:04 | 248M |
| DEF CON 9 - Mark Grimes - TCPIP Intelligent Agents The Future of Electronic Warfare and Defense * | kjA_dPP4Aec | 01:07:54 | 331M |
| DEF CON 9 - Michael Wilson - Hacker Doctrine in Information Warfare | AGY75PIjlhA | 55:20 | 257M |
| DEF CON 9 - Nick Farr - Designing Secure Interfaces "for Dummies" * | rpNS2I5r5L0 | 47:41 | 223M |
| DEF CON 9 - Ofir Arkin - Introducing X Playing Tricks With ICMP * | ISUew5U9GyQ | 55:41 | 264M |
| DEF CON 9 - Optyx - Kernel Intrusion System * | r2Rc0aLjp2w | 31:02 | 145M |
| DEF CON 9 - Peter Shipley - 802.11b War Driving and Lan Jacking * | bWH-3OZJ0vo | 57:13 | 164M |
| DEF CON 9 - Phil King - 8 bits and 8 pins More Fun with Microcontroller Hacking * | jTPpesQ2_Aw | 01:02:23 | 297M |
| DEF CON 9 - Raven Alder - Perl Script That Tracks DoS Attacks * | ooqlxFmSIro | 34:35 | 166M |
| DEF CON 9 - Richard Thieme - Hacking in a Context of Pan-global Culture * | Wai_EssEbIc | 01:03:41 | 303M |
| DEF CON 9 - Rob Schein - Evaluating VPN Solutions * | B_WDD_D8s0Q | 01:11:32 | 201M |
| DEF CON 9 - Robert Graham - The Principals of Cyber Anarchy * | Zz_fRP6A6UM | 37:03 | 177M |
| DEF CON 9 - Robert Grill and Michael Cohen - Windows NT and Novell Host Based Intrusion Detection * | cOxHiBhJUbM | 39:59 | 186M |
| DEF CON 9 - Robert Muncy -Securing Cisco Routers * | uFpDINk2lBs | 27:33 | 128M |
| DEF CON 9 - Sharad - Security & Privacy * | CRwerEchg5c | 53:25 | 168M |
| DEF CON 9 - Shatter - FAQ The Newbies * | Fq_ua1tmZEo | 01:01:57 | 216M |
| DEF CON 9 - Simple Nomad - Widdershins De evolution and the Politics of Technology * | fAqaSvYe_3M | 47:50 | 115M |
| DEF CON 9 - Technodragon - Hardware Mods * | umrIUZddOBE | 48:26 | 226M |
| DEF CON 9 - The Defendant - So You Got Your Lame Ass Sued * | 49kiyXPnrFw | 57:16 | 214M |
| DEF CON 9 - The Defendant - So You Got Your Lame Ass Sued * | r0k-luiPHcg | 57:16 | 266M |
| DEF CON 9 - Thomas J. Munn - Using Open BSD, snort, Linux, and a few other tricks * | n4cUmZavnnA | 49:15 | 239M |
| DEF CON 9 - Thor - Grabbing User Credentials via W2k ODBC Libraries * | HTJZSriE8ec | 37:33 | 123M |
| DEF CON 9 - Tim Mullen - RestrictAnonymous: Enumeration and the Null user * | HJzqeSA7IFQ | 24:54 | 116M |
| DEF CON 9 - William Tafoya - Hacking the Mind * | DQKYZtGXPts | 47:01 | 115M |
| DEF CON China Party - Cooper Quintin- Detecting Fake 4G Base Stations in Real Time | q68V-s12RKE | 24:18 | 170M |
| DEF CON China Party 2021 Miss Jackalope | rsHSkRAt8Gg | 01:40:14 | 3G |
| DEF CON China Party 2021 - CocktailCon | xIAgnPGlcwg | 01:14:17 | 710M |
| DEF CON China Party 2021 - DEF CON Culture - Dead Addict | cGzcNyyiCHs | 29:58 | 189M |
| DEF CON China Party 2021 - IOT Fails Learning from Sex Toys How Not to Suck - RenderMan | xtDb_Casjjw | 49:54 | 140M |
| DEF CON China Party 2021 - Keynote Interview Excerpt - Steve Wozniak, The Dark Tangent | y16QQilQGsg | 05:20 | 54M |
| DEF CON China Party 2021 - Malware Included Imported 3d Party JS as Attack Vectors - Michael Schrenk | 0uekC_dWERw | 27:27 | 73M |
| DEF CON China Party 2021 - Whispers Among the Stars - James Pavur | 90_4kKpgFuw | 29:50 | 68M |
| DEF CON China Party 2021- Wall of Sheep: Hilarious Fails and the Sheep Behind Them - Riverside | 4ZabsNgMHCM | 10:55 | 82M |
| DEF CON Groups - Jayson E. Street - New Year's DCG Update | WVPm25l3OJ4 | 13:00 | 142M |
| DEF CON GROUPS 2018 - April Wright - Boston - DC617 | vaXaAvN_DRM | 02:57 | 97M |
| DEF CON GROUPS 2018 - Jun Li - Beijing | f6gXqCDbkT8 | 09:37 | 240M |
| DEF CON Groups January 2018 | gS-gX3QLYno | 10:01 | 42M |
| DEF CON Lockpicking table @ HACKED -TriBeCa Film Festival | aQ37in74tlk | 00:55 | 5M |
| DEF CON NOC - Everything you wanted to know about the DEF CON NOC - DEF CON 27 Conference | 3niJdmhdJBk | 57:17 | 931M |
| DEF CON Policy - International Cyber Policy 101 - Panel | JmjWz3XVfEg | 01:29:52 | 916M |
| DEF CON Safe Mode Aerospace Village What I Learned Trying to Hack a 737 | Uw-8H5x-NzQ | 27:49 | 208M |
| DEF CON Safe Mode Cooper Quintin Detecting Fake 4G Base Stations in Real Time Q&A | UVwOlZ3xitc | 29:48 | 264M |
| DEF CON Safe Mode Erik Hunstad Domain Fronting is Dead Long Live Domain Fronting Q&A | y3PZ3C4xGCc | 29:35 | 160M |
| DEF CON Safe Mode Hacker Jeopardy Saturday | 71w3bOMw7uE | 01:21:01 | 662M |
| DEF CON Safe Mode Ham Radio Village K0BAK The K0BAK News Van 1 of 2 | U78rLGttTq4 | 59:34 | 300M |
| DEF CON Safe Mode Lock Bypass Village - Bill Graydon - OSINT of Facilities by Physical Recon | bgENH9EBqq8 | 32:07 | 253M |
| DEF CON Safe Mode Lock Bypass Village - Karen Ng - Bypass 101 | 3yKZqiYGYnA | 28:46 | 225M |
| DEF CON Safe Mode Recon Village - Ladislav Baco - Hunting for Blue Mockingbird Coinminers | PWeKDjMtC9M | 24:20 | 86M |
| DEF CON Safe Mode - Christian “quaddi” Dameff MD and panel - D0 N0 H4RM Q and A | w-BtSUTdTk0 | 53:08 | 298M |
| DEF CON Safe Mode - Feng Xiao - Discovering Hidden Properties to Attack NodeJS Ecosystem Q&A | ne4_dr0OdUo | 31:26 | 145M |
| DEF CON Safe Mode - Gal Zror - Don't Ruck Us Again The Exploit Returns Q&A | pqCaaB_EieY | 26:45 | 219M |
| DEF CON Safe Mode - James Pavur - Whispers Among the Stars Q and A | Y-0oHxzpJ-8 | 28:45 | 196M |
| DEF CON Safe Mode - Voting Village - Day 2 Opening Remarks | pdL4bbDn1Aw | 04:03 | 37M |
| DEF CON Safe Mode -Jack Baker - Finding and Exploiting Bugs in Multiplayer Game Engines Q&A | 1GiM-44q_QM | 29:58 | 161M |
| DEF CON Safe Mode -Jiska Classen and Francesco Gringoli - Spectra New Q and A | QNERjp0c2Z4 | 29:47 | 167M |
| DEF CON Safe Mode ICS Village - ac0rn, atlas 0f d00m - Vivisecting PowerPC | cuDR7rvEWPM | 01:03:48 | 1G |
| DEF CON Safe Mode Lock Picking Village - zeefeene - High Security Wafer Locks An Oxymoron | FxaQw4CUaP8 | 49:01 | 307M |
| DEF CON Safe Mode Password Village - Getting Started with Hashcat | MBTJ8f6Fsmg | 23:49 | 527M |
| DEF CON Safe Mode Voting Village - Presentation Intros | jZpL6tH-1sk | 34:29 | 63M |
| DEF CON Safe Mode - Joshua Maddux - When TLS Hacks You Q&A | KsDJ5z5Vx_M | 28:00 | 163M |
| DEF CON Safe Mode - Alvaro Muñoz and Oleksandr Mirosh - Room For Escape Scribbling Outside The Lines | -XOs_bnZjgg | 31:45 | 160M |
| DEF CON Safe Mode - Ask the EFF: Meet the EFA Q&A | 8ERCa8e6vRQ | 01:39:15 | 266M |
| DEF CON Safe Mode - Ayoul3 - Only Takes a Spark - Popping a Shell on 1000 Nodes Q&A | FKMc7LgHeck | 27:35 | 242M |
| DEF CON Safe Mode - Badass Bowden - Fireside Lounge Shrek Juggs and Toxic Trolls Q& A | Y4KizB8a7Cg | 01:03:21 | 399M |
| DEF CON Safe Mode - Bill Demirkapi - Demystifying Modern Windows Rootkits Q&A | h2HGzfV_gUQ | 30:30 | 182M |
| DEF CON Safe Mode - Bill Graydon - Exploiting Key Space Vulnerabilities in the Physical World Q&A | vgP4p87Gx_M | 28:11 | 168M |
| DEF CON Safe Mode - Bill Graydon - Exploiting Key Space Vulnerabilities in the Physical World | GccmPoUeeyg | 01:46:15 | 1G |
| DEF CON Safe Mode - Career Hacking Village - National Service Panel | eicUXYrJmEo | 37:03 | 270M |
| DEF CON Safe Mode - Christopher Wade - Beyond Root Custom Firmware For Embedded Mobile Chipsets Q&A | npY5XLaRMlA | 31:20 | 192M |
| DEF CON Safe Mode - CTF - Shift 1 Public Recap | 77mK3lbkedw | 01:03:15 | 408M |
| DEF CON Safe Mode - CTF - Final in game Recap | HafPDfgXT_o | 59:28 | 243M |
| DEF CON Safe Mode - CTF - Quals Welcome | rJm7yTIXyAw | 03:11 | 56M |
| DEF CON Safe Mode - Dylan Ayrey and Allison Donovan - Lateral Movement and Privilege Escalation | 7OfLeGWRExI | 26:32 | 253M |
| DEF CON Safe Mode - Elie Bursztein - A Hacker's Guide to Reducing Side Channel Attack Surfaces | nGKfWD5BnRI | 33:28 | 178M |
| DEF CON Safe Mode - Eyal Itkin - Don't Be Silly It's Only a Lightbulb Q&A | 8l54YnRxCQI | 31:26 | 155M |
| DEF CON Safe Mode - Hacker Jeopardy - Friday Night | 86SgQcklkU8 | 01:43:36 | 985M |
| DEF CON Safe Mode - Hadar and Bar - After Stuxnet Printing still the Stairway to Heaven Q and A | D-Oa3mOoGDU | 23:31 | 109M |
| DEF CON Safe Mode - Hadrien Barral , Rémi Géraud Stewart - DNSSECTION Q and A | ZRKsf2Zw--0 | 32:07 | 198M |
| DEF CON Safe Mode - Ismail Melih Tas and Kubilay Ahmet Kucuk - Practical VoIPUC Hacking w Mr SIP Q&A | 8i9MNu15z_E | 27:40 | 268M |
| DEF CON Safe Mode - Jake Labelle - Getting Shells on zOS with Surrogat Chains Q&A | mbPgDJ4misk | 29:06 | 169M |
| DEF CON Safe Mode - Michael Stay - How we recovered XXX,000 in Bitcoin from an zip file Q&A | Ns-WujgsCt4 | 29:09 | 193M |
| DEF CON Safe Mode - Mickey Shkatov and Jesse Michael - Bytes In Disguise Q&A | foXy68u4fao | 29:51 | 215M |
| DEF CON Safe Mode - Patrick Kiley - Reverse Engineering a Tesla Battery Mgmt. System for Moar Power | DycvqZTw-18 | 36:26 | 111M |
| DEF CON Safe Mode - Patrick Kiley - Reverse Engineering the Tesla Battery Management System Q&A | dAft0m4oL_Q | 30:38 | 279M |
| DEF CON Safe Mode - Patrick Wardle - Office Drama on macOS Q&A | lsqE84_DNKU | 27:57 | 242M |
| DEF CON Safe Mode - Paul Marrapese - Abusing P2P to Hack 3 Million Cameras Q and A | JyEpuQyqtbU | 31:09 | 136M |
| DEF CON Safe Mode - Sean Metcalf - Hacking the Hybrid Cloud Q&A | H26ElMkweiw | 33:59 | 216M |
| DEF CON Safe Mode - Shlomi Oberman, Moshe Kol, Ariel Schon - The Ripple20 Q and A | VZNzY-cfQ7M | 31:03 | 194M |
| DEF CON Safe Mode - Voting Village - Day 2 Closing Remarks | bn5Oyk9C-50 | 34:53 | 648M |
| DEF CON Safe Mode - Whose Slide Is It Anyway - 1 of 2 | 00njwXnHAnY | 01:13:32 | 1G |
| DEF CON Safe Mode - Whose Slide Is It Anyway - 2 of 2 | vVC5SzYW3eU | 48:25 | 430M |
| DEF CON Safe Mode -CTF - Shift 1 Stream | hd0gkciEsn0 | 10:40 | 28M |
| DEF CON Safe Mode Aerospace Village - Alex Lomas - Introduction to ACARS | _9nUChpnNUI | 26:01 | 55M |
| DEF CON Safe Mode Aerospace Village - David Robinson - General Aviation GA Electronic Flight Bags | PiSI6OoqD1w | 43:47 | 100M |
| DEF CON Safe Mode Aerospace Village - Laura Chappell - Deep Space Networking | 7QDEyQmPRjU | 35:20 | 146M |
| DEF CON Safe Mode Aerospace Village - Liz Wharton - Airport Hacking Choose Your Own Adventure | 86u_aYpEma0 | 38:27 | 106M |
| DEF CON Safe Mode Aerospace Village - Matt Gaffney - MITM The Mystery in the Middle | fEv2vZ5yUac | 53:36 | 95M |
| DEF CON Safe Mode Aerospace Village - Opening Remarks | -agEI9QFdTc | 36:31 | 129M |
| DEF CON Safe Mode Aerospace Village - Panel - Hackers and ISACs | 9DwQgJ1cTnY | 48:15 | 415M |
| DEF CON Safe Mode Aerospace Village - Alex Lomas - TCAS and ILS Spoofing Demonstration | blclSdJ71vo | 09:44 | 21M |
| DEF CON Safe Mode Aerospace Village - Alex Lomas, Ken Munro -747 Walkthru From a Hacker Perspective | V0zH5e6og2g | 25:00 | 151M |
| DEF CON Safe Mode Aerospace Village - Ali Abdollahi - Hacking Airplane A2G Systems | 4Lqh-JvgX_M | 16:56 | 46M |
| DEF CON Safe Mode Aerospace Village - Allan Tart, Fabian Landis - Low Cost VHF Receiver | yEP7fT4Z-Uw | 23:06 | 44M |
| DEF CON Safe Mode Aerospace Village - Brandon Bailey - Exploiting Spacecraft | WFhoV1c0rlc | 46:46 | 105M |
| DEF CON Safe Mode Aerospace Village - Cornelius, Brown - Cybersecurity & Aviation Regulation | nPx1wRgoFeA | 49:26 | 81M |
| DEF CON Safe Mode Aerospace Village - Dadgar, Zaimiri, Dorosti - Attacking Flight Management Systems | jVRCTyrSUH4 | 27:24 | 47M |
| DEF CON Safe Mode Aerospace Village - Eric Escobar - Talking to Satellites | wurZ4fCaHIo | 46:42 | 97M |
| DEF CON Safe Mode Aerospace Village - Feyt, Rowell, LeRray - Critical Aerospace Cybersecurity | hwEWwTU01Wk | 30:10 | 69M |
| DEF CON Safe Mode Aerospace Village - Gui Michel - Breakdown of the FAA Privacy ICAO Address Program | 4w44NpnFGBw | 19:32 | 37M |
| DEF CON Safe Mode Aerospace Village - Harshad Sathaye - GPS Spoofing 101 | kh6lczeGP3U | 22:45 | 39M |
| DEF CON Safe Mode Aerospace Village - Harshad Sathaye - A Deeper Dive into ILS and ADS B Spoofing | R0ucHFBw8W0 | 22:39 | 52M |
| DEF CON Safe Mode Aerospace Village - James Pavur - Trust and Truth in SSA | rkT8mxbWaIU | 24:38 | 57M |
| DEF CON Safe Mode Aerospace Village - Liz Wharton - Airport Hacking Choose Your Own Adventure | n04DAvO1vf8 | 38:27 | 75M |
| DEF CON Safe Mode Aerospace Village - Martin Strohmeier - Dissecting Wireless Privacy in Aviation | rSDQDhB7Qtg | 20:06 | 36M |
| DEF CON Safe Mode Aerospace Village - Matt Murray - Satellite Orbits 101 | Qsb703Z3y3A | 10:48 | 50M |
| DEF CON Safe Mode Aerospace Village - Matt Smith - Pilot Reactions to Attacks on Avionic Systems | cfPoHOrIpH0 | 21:42 | 49M |
| DEF CON Safe Mode Aerospace Village - Michael Vanguardia - Secure Airplane Development Lifecycle | x68Q_t9OPqw | 24:24 | 86M |
| DEF CON Safe Mode Aerospace Village - PamMelroy - Cybersecurity Lessons Learned in Human Spaceflight | pieaylw38cY | 43:57 | 147M |
| DEF CON Safe Mode Aerospace Village - Panel - Building Connections Across the Aviation Ecosystem | XZ0dS-ayQA0 | 01:00:07 | 186M |
| DEF CON Safe Mode Aerospace Village - Panel - Hacking Aerospace Cybersecurity Regulation | 2ykwT5DHPeU | 49:04 | 198M |
| DEF CON Safe Mode Aerospace Village - Patrick Kiley - Experimental Aviation Risks and Rewards | AisXxU1yodo | 26:56 | 126M |
| DEF CON Safe Mode Aerospace Village - Rick Hansen - Software Defined Radios for Aerospace Cyber | zdPj6USdRZc | 23:47 | 145M |
| DEF CON Safe Mode Aerospace Village - Understanding Space Through a Cybersecurity Lens | EYId2Y1oVSI | 02:57:23 | 440M |
| DEF CON Safe Mode Aerospace Village - Workshop - Simulated Satellite Communications on Raspberry Pi | nuIzTMf6wI8 | 16:19 | 41M |
| DEF CON Safe Mode Aerospace Village -Jay Angus - Checklist for Aviation Vulnerability Disclosure | 9OVQBL6Sab8 | 20:14 | 34M |
| DEF CON Safe Mode AI Village - Nahid Farhady - A Dive into Privacy-Preserving Machine Learning | Etv-GGjkcJE | 20:36 | 309M |
| DEF CON Safe Mode AI Village - comathematician - Hyperlocal Drift Detection with Goko | -F-eCJHSw9s | 28:42 | 548M |
| DEF CON Safe Mode AI Village - Erick Galinkin - Babys First 100 MLsec Words | Xo2KZCbJWCg | 29:46 | 291M |
| DEF CON Safe Mode AI Village - GTKlondike Hacking with Skynet - How AI is Empowering Adversaries | 1ATu9tC4b04 | 48:52 | 303M |
| DEF CON Safe Mode AI Village - Hyrum Anderson, Zoltan Balaz - Machine Learning Competition 2020 | zD51Q8ZU6S0 | 21:32 | 80M |
| DEF CON Safe Mode AI Village - Imeyerov - Project Domino Citizen Data Science Against COVID misinfo | tHhi83yUl_k | 27:45 | 649M |
| DEF CON Safe Mode AI Village - Journal Club Live - Fawkes Facial Recognition | dJTuvt1nAo0 | 53:35 | 1G |
| DEF CON Safe Mode AI Village - Journal Club Live - Pursuit of Exploitable Bugs in Machine Learning | Nkroi-fjlys | 57:45 | 1G |
| DEF CON Safe Mode AI Village - Lee, Saxe - Detecting SE emails with a Bleeding Edge Neural Model | O4NV2ZR2MtQ | 49:24 | 556M |
| DEF CON Safe Mode AI Village - Nahid Farhady - Spectrum Framework for ML based Threat Monitoring | H7KfmNNkXiY | 23:54 | 438M |
| DEF CON Safe Mode AI Village - Vahid Behdazan - Security Challenges in Deep Reinforcement Learning | u5SPg9XDqGM | 57:37 | 447M |
| DEF CON Safe Mode AI Village - Workshop - Adversarial Machine Learning Attacking AMSI Providers | F0i5qmSOye8 | 01:29:51 | 760M |
| DEF CON Safe Mode AppSec Village - Gregg Horton, Ryan Slama - 10,000 Dependencies Under the Sea | YgsoBP2ahmU | 19:17 | 59M |
| DEF CON Safe Mode AppSec Village - Amar, Molveau - Turning Offsec Mindset to Developer's Toolset | w1A8-cJFBRg | 46:56 | 578M |
| DEF CON Safe Mode AppSec Village - Chloe Messdaghi - The Elephant in the Room: Burnout | XS_aNuUk6I0 | 50:27 | 408M |
| DEF CON Safe Mode AppSec Village - Christian Schneider - Threagile Agile Threat Modeling | 8I5feMif_zk | 28:10 | 324M |
| DEF CON Safe Mode AppSec Village - David Sopas, Paulo Silva - API inSecurity TOP 10 | As5JJ_Eh_aY | 36:14 | 374M |
| DEF CON Safe Mode AppSec Village - David Waldrop - The DevOps and Agile Security Toolkit | ZZkE7nPOtjE | 50:17 | 472M |
| DEF CON Safe Mode AppSec Village - Fredrick “Flee” Lee - What Bruce Lee Can Teach Us About AppSec | lhLI5bNK4vQ | 40:39 | 495M |
| DEF CON Safe Mode AppSec Village - Jarrod Overson - Hackium a Browser for Web Hackers | NB5eJulTw-0 | 39:05 | 549M |
| DEF CON Safe Mode AppSec Village - Kelley Robinson - 2FA in 2020 and Beyond | P4B0ClcJZ_4 | 26:22 | 272M |
| DEF CON Safe Mode AppSec Village - Maddie Stone - Who's secure who's not who makes that choice | t-5Qc7OOkKI | 49:04 | 589M |
| DEF CON Safe Mode AppSec Village - Mario Areias - Threat Modelling the Death Star | YpT8Euc0mm4 | 45:05 | 553M |
| DEF CON Safe Mode AppSec Village - Mehmet D Ince - A Heaven for Hackers: Breaking a Web Security | UujbUSVQBq0 | 48:02 | 635M |
| DEF CON Safe Mode AppSec Village - Parsia Hakimian - localghost Escaping the Browser Sandbox | dFi1SNutf4A | 36:57 | 296M |
| DEF CON Safe Mode AppSec Village - Pedro Umbelino ,João Morais - Android Bug Foraging | QmcXtfLU1Xw | 41:41 | 489M |
| DEF CON Safe Mode AppSec Village - Philipp Krenn - Secure Your Code Injections and Logging | Pqf4y518xhQ | 46:19 | 438M |
| DEF CON Safe Mode AppSec Village - Phillip Marlow - Can't Touch This Detecting Lateral Movement | ABLRgRITe2M | 20:10 | 157M |
| DEF CON Safe Mode AppSec Village - Vandana Verma Sehgal - Running an appsec program w⧸ open source | -HV2SZCggA0 | 57:07 | 712M |
| DEF CON Safe Mode Biohacking Village - Panel - How Independent Researchers work with MDMs | nDXS19Dpa0A | 01:16:10 | 918M |
| DEF CON Safe Mode Biohacking Village - Sam Cervantes - Open Ventilator Remote Monitoring Project | lYluZbfIZTI | 31:24 | 308M |
| DEF CON Safe Mode Biohacking Village - Andrea Downing - Infodemic: Threat Models | O9DpdM9bws0 | 18:09 | 93M |
| DEF CON Safe Mode Biohacking Village - Bill Hagestad - Chinese Military Lab Mission + COVID-19 | IffbD0gOXVY | 28:36 | 314M |
| DEF CON Safe Mode Biohacking Village - Bryson Bort - MedICS | 1Ii4tct5io0 | 37:22 | 332M |
| DEF CON Safe Mode Biohacking Village - Curry, Dougherty - INCLUDES NO DIRT: Threat Modeling | JSEDAqOfI48 | 56:15 | 557M |
| DEF CON Safe Mode Biohacking Village - Dameff, Tully - How COVID19 Changed Cyber Disaster Medicine | gX5D14zObuQ | 44:09 | 308M |
| DEF CON Safe Mode Biohacking Village - Diabetes Panel | 4a2Kmq74z5A | 44:11 | 434M |
| DEF CON Safe Mode Biohacking Village - Jack Twiddy - How to Grow a Brain in a Jar | O_4bcdeFFYs | 22:45 | 194M |
| DEF CON Safe Mode Biohacking Village - Lucia C Savage - What's Up with Proposed Privacy Legislation | lcUrWDCUyCU | 32:27 | 437M |
| DEF CON Safe Mode Biohacking Village - Mitchell Parker Panel - Advancing Medical Device Security | rvop42q9eUE | 51:01 | 506M |
| DEF CON Safe Mode Biohacking Village - Mix录 Laufer - Making Next Generation Drugs at Home | g7vgMbHwtsI | 27:29 | 245M |
| DEF CON Safe Mode Biohacking Village - Negre, McMahon- Securing Medical Devices on a Shoestring | BSxmfJ0m4-M | 01:47:24 | 817M |
| DEF CON Safe Mode Biohacking Village - Nina Alli - Keynote | 7BpHCT1AdqI | 01:29:07 | 1G |
| DEF CON Safe Mode Biohacking Village - Sam Cervantes - Open Ventilator Remote Monitoring Project | mQEcWpn2msQ | 31:24 | 308M |
| DEF CON Safe Mode Biohacking Village - Sarah Blossom - Institutional Review Board for Biohackers | hEHk1h0SRWM | 14:12 | 180M |
| DEF CON Safe Mode Biohacking Village - Seth Carmody - Why is Security Hard? | RXAt8lE2TNI | 23:18 | 170M |
| DEF CON Safe Mode Biohacking Village - Veronica Schmitt - Medical Tech: How Do We Unf*ck Things | bs82dyw7zcU | 27:35 | 218M |
| DEF CON Safe Mode Biohacking Village - Vidya Murthy - The Underestimated Threat Vector: Homogeneity | V_LQgxRG7y0 | 11:27 | 150M |
| DEF CON Safe Mode Biohacking Village - Yong Bee Lim - Understanding DIYBio and Community Labs | 6Ct7HiWxEFw | 55:48 | 479M |
| DEF CON Safe Mode Blockchain Village - Martin Abbatemarco - 7 Phases Of Smart Contract Hacking | gGUOjtri4n8 | 30:47 | 73M |
| DEF CON Safe Mode Blockchain Village - Josh McIntyre - Chaintuts - Bitcoin Address Generator | JIe63nm5aNo | 28:38 | 85M |
| DEF CON Safe Mode Blockchain Village - Peiyu Wang - Exploit Insecure Crypto Wallet | zuO-Y_aum0I | 30:56 | 49M |
| DEF CON Safe Mode Blockchain Village - Peter Kacherginsky - Attacking & Defending Blockchain Nodes | ht-oztt7kns | 45:12 | 92M |
| DEF CON Safe Mode Blockchain Village - Peter Kacherginsky - Keynote | ZRnXDG15nKU | 53:45 | 108M |
| DEF CON Safe Mode Blockchain Village - Rastogi Gokul - Verifiable Delay Functions Preventing DDoS | OoIaTQhUi8E | 57:33 | 122M |
| DEF CON Safe Mode Blockchain Village - Ron Stoner - Securing The Cosmos | Blc5CsXkQmg | 52:12 | 87M |
| DEF CON Safe Mode Blockchain Village - Ryan Rubin - Is DeFi Ready for Prime Time | Fb6os7noZiA | 57:20 | 418M |
| DEF CON Safe Mode Blockchain Village - Ryan Rubin - Is DeFi Ready for Prime Time Q and A | B_TX4J4lZlI | 06:02 | 8M |
| DEF CON Safe Mode Blockchain Village - Suhyeon Lee - Blockchain for Cyber Defense | KtPR8Dno60E | 43:17 | 82M |
| DEF CON Safe Mode Blue Team Village - Intro | 7cBNuXO34jo | 08:37 | 78M |
| DEF CON Safe Mode Blue Team Village - Promo Slideshow | Yv4w519l_YE | 10:26 | 126M |
| DEF CON Safe Mode Blue Team Village - Allen Baranov - How To Stop A Virus With A Spreadsheet | TMpIiDVd6D8 | 21:21 | 145M |
| DEF CON Safe Mode Blue Team Village - Bashar Shamma - Moloch OPENSOC CTF TOOL DEMO | vLie_B3ZqvE | 20:15 | 138M |
| DEF CON Safe Mode Blue Team Village - Canary - Thinkst Canary OPENSOC CTF Tool Demo | RKETKYMK3W4 | 32:39 | 155M |
| DEF CON Safe Mode Blue Team Village - ch33r10 - Indicators Of Emulation | 23Jr-kMkiQc | 36:04 | 243M |
| DEF CON Safe Mode Blue Team Village - Connor Morley - OuterHaven UEFI Memory Space | cTKrVGVFp5k | 36:35 | 273M |
| DEF CON Safe Mode Blue Team Village - corvusactual - No Question Teamviewer Police and Consequence | coGmg69YMVM | 24:31 | 160M |
| DEF CON Safe Mode Blue Team Village - Holger Unterbrink - Reversing With Dynamic Data Resolver | r_RaQHHz7q0 | 59:31 | 389M |
| DEF CON Safe Mode Blue Team Village - Josh - Suricata OPENSOC CTF Tool Demo | UPBrpY2SMpg | 31:49 | 151M |
| DEF CON Safe Mode Blue Team Village - Juan Francisco Bolivar & Jose Miguel Marichal - 0365 Squatting | C8qQ3uKbXsA | 18:39 | 93M |
| DEF CON Safe Mode Blue Team Village - JunWei Song & KunYu Chen - QuarkEngine | XK-yqHPnsvc | 30:42 | 205M |
| DEF CON Safe Mode Blue Team Village - Lennart Koopmann - Graylog OPENSOC CTF Tool Demo | RoGh-X0wEvk | 43:54 | 188M |
| DEF CON Safe Mode Blue Team Village - Mangatas Tondang - Detecting The Not PowerShell Gang | dWTZ71S3pe4 | 31:34 | 176M |
| DEF CON Safe Mode Blue Team Village - Mike Cohen - Velociraptor OPENSOC CTF Tool Demo | _5Sy7L6HErQ | 42:37 | 190M |
| DEF CON Safe Mode Blue Team Village - Panel - Incident Response Panel | fyFdoMKyNU8 | 01:16:23 | 416M |
| DEF CON Safe Mode Blue Team Village - Panel - Meet A Mentor Program | aK3kWXH-3vE | 01:29:12 | 517M |
| DEF CON Safe Mode Blue Team Village - Whitney Champion - Osquery OPENSOC CTF Tool Demo | qFVTy4TgtZk | 08:31 | 29M |
| DEF CON Safe Mode Blue Team Village - zeek - Zeek OPENSOC CTF Tool Demo | vCGbwM7zrS4 | 32:56 | 173M |
| DEF CON Safe Mode Blue Team Village -Jake Smith & Jack McDowell - Building BLUESPAWN | -8QC0CdCbuc | 52:01 | 250M |
| DEF CON Safe Mode Blue Team Village -Tim Johnson - Kibana: OPENSOC CTF Tool Demo | j9OD8GFU4NM | 30:42 | 169M |
| DEF CON Safe Mode Car Hacking Village - Marcelo Sacchetin - ChupaCarBrah | -rwXSVT7kNo | 41:34 | 510M |
| DEF CON Safe Mode Car Hacking Village - Brent Stone - CAN be super secure Bit Smashing FTW | _DDJbY2-2A0 | 20:43 | 233M |
| DEF CON Safe Mode Car Hacking Village - Dan Salloum, Thomas Hayes - Before J1939 | arRTd-0hq30 | 25:32 | 293M |
| DEF CON Safe Mode Car Hacking Village - Derrick - All Aboard the CAN Bus or Motorcycle | YSApvBDIVCM | 29:08 | 282M |
| DEF CON Safe Mode Career Hacking Village - Amelie Koran - The Individual Contributor to Tech Executi | 847bHTR57NQ | 28:09 | 196M |
| DEF CON Safe Mode Career Hacking Village - Bob Wheeler - Veteran Transition Tips | UsO5SvFvSAY | 39:16 | 130M |
| DEF CON Safe Mode Career Hacking Village - Jenai Marinkovic - Future Proofing Your Career | KCnVCdasZMc | 24:00 | 100M |
| DEF CON Safe Mode Career Hacking Village - Panel - Drinks With Recruiters | GVJTwNa7IuI | 51:56 | 395M |
| DEF CON Safe Mode Career Hacking Village - Roy Wattanasin - Key Ingredients for the Job Interviews | oyoG3FCh-Rg | 35:29 | 86M |
| DEF CON Safe Mode Career Hacking Village - Steven Bernstein - Cons & Careers | gidqgoF41LQ | 50:53 | 113M |
| DEF CON Safe Mode Crypto and Privacy Village - Emily Crose - Fun with FOIA | 7utszstxBUM | 37:00 | 174M |
| DEF CON Safe Mode Crypto and Privacy Village - Zhanna Malekos Smith - Fear Uncertainty and Doubt | 0AcKJXdeseA | 25:28 | 180M |
| DEF CON Safe Mode Crypto and Privacy Village - Cathy Gellis, Riana Pfefferkorn - Fireside Chat | 678EW8v09z8 | 01:08:33 | 560M |
| DEF CON Safe Mode Crypto and Privacy Village - Hanno Böck - STARTTLS is Dangerous | 7Sbx8okI9Xw | 45:20 | 200M |
| DEF CON Safe Mode Crypto and Privacy Village - Mansi Sheth - How to store sensitive info in 2020? | 4Tn71-1GN20 | 44:38 | 281M |
| DEF CON Safe Mode Crypto and Privacy Village - Per Thorsheim - Hacking like Paris Hilton | Yx-0PdSGb8I | 48:16 | 472M |
| DEF CON Safe Mode Crypto and Privacy Village - Porter Adams and Emily Stamm - Online Voting | E6qXM-UibdA | 28:00 | 78M |
| DEF CON Safe Mode Crypto and Privacy Village -Kelley Robinson- What if we had TLS for phone numbers? | SxanoyVA8g4 | 25:26 | 148M |
| DEF CON Safe Mode DC Groups - DC201 New Jersey - Show and Tell | 90wL1kpmEXQ | 48:32 | 78M |
| DEF CON Safe Mode DC Groups - DC212 New York City - Remote Presenting | HKs8isufnLU | 23:59 | 42M |
| DEF CON Safe Mode DC Groups Village - DC603 Vermont - DNS | fbzG570_gVI | 49:44 | 94M |
| DEF CON Safe Mode DC Groups Village - Jayson Street - Keynote | isnp54q47VI | 25:33 | 50M |
| DEF CON Safe Mode DC Groups Village - DC0471 - Trivandrum Red Teaming | LTgJm2cZbaA | 44:50 | 87M |
| DEF CON Safe Mode DC Groups Village - DC11562 Santiago - Stories of a Hacker in the Health Sector | Uw53Fjuhkko | 01:18:26 | 320M |
| DEF CON Safe Mode DC Groups Village - DC574 South Bend - OSINT | B8AKlitPKSI | 18:22 | 54M |
| DEF CON Safe Mode DC Groups Village - DC619, DC858 San Diego - Saving Yourself from Microsoft | beqFjnS1W3Q | 43:25 | 82M |
| DEF CON Safe Mode DC Groups Village - DC644 Tijuana - Espionage | j3GqTPgTeq4 | 13:37 | 40M |
| DEF CON Safe Mode DC Groups Village - quaddi - Medical Device Security | SGZqpM7W_p8 | 47:01 | 91M |
| DEF CON Safe Mode Demo Labs - Chris Nevin - Carnivore | LJFuydx-HtE | 52:38 | 142M |
| DEF CON Safe Mode Demo Labs - Matthew Creel - redlure | ZtCMnKHZJUM | 29:02 | 76M |
| DEF CON Safe Mode Demo Labs - Ajin Abraham - Mobile App Security Testing with MobSF | 1NIQs82n3nw | 30:37 | 228M |
| DEF CON Safe Mode Demo Labs - Emilio Couto - CIRCO v2 | jBobjt_8W6o | 36:18 | 299M |
| DEF CON Safe Mode Demo Labs - Jakub Botwicz - Cotopaxi | qkEZ9X5gLv4 | 28:50 | 263M |
| DEF CON Safe Mode Demo Labs - Olivier Bilodeau - PyRDP | 1q2Eo3x3u0g | 40:00 | 241M |
| DEF CON Safe Mode Demo Labs - Tamoaki Tani - malconfscan with cuckoo | I95HCADP6As | 19:31 | 66M |
| DEF CON Safe Mode Demo Labs - Vincent Rose - Starkiller | kphstBd9PU4 | 19:58 | 58M |
| DEF CON Safe Mode Demo Labs - Viral Maniar - Phirautee | vTDQF3dW2sg | 21:26 | 225M |
| DEF CON Safe Mode Ethics Village - Travis LeBlanc - US Privacy and Civil Liberties Oversight Board | bS10sRfpKyE | 49:16 | 153M |
| DEF CON Safe Mode Hack The Seas Village - Gary Kessler - Hacker Challenge Single Point Prediction | uZ3TQRrplT4 | 15:22 | 38M |
| DEF CON Safe Mode Hack The Seas Village - Gary Kessler - Build a Raspberry AIS | fLuQIY7HlvY | 01:13:51 | 167M |
| DEF CON Safe Mode Hack The Seas Village - Andrew Tierney - Speed 2 The Poseidon Adventure | jKrrD0Ue7Kk | 27:36 | 138M |
| DEF CON Safe Mode Hack The Seas Village - Gary Kessler - AIS Spoofing Attacks and Some Tools | XNtS0wQIyjY | 01:03:17 | 263M |
| DEF CON Safe Mode Hack The Seas Village - Gary Kessler - Build an AIS receiver with a Raspberry Pi | ThoizEv4QV0 | 54:13 | 274M |
| DEF CON Safe Mode Hack The Seas Village - Grant Romundt - Hacking the SeaPod | VirhO41bYs0 | 58:00 | 312M |
| DEF CON Safe Mode Hack The Seas Village - Nina Kollars - 40,000 Leagues UUV Death Match | PCgRO1qtIPg | 56:55 | 374M |
| DEF CON Safe Mode Hack The Seas Village - Stephen Gerling - Yacht Pwned | pERP151VFY0 | 48:55 | 242M |
| DEF CON Safe Mode Ham Radio Village - Ham Radio Snail Mail NTS and the Radiogram Format | 1wAdJOFS6Vg | 01:35:57 | 472M |
| DEF CON Safe Mode Ham Radio Village - Panel Discussion - What makes a good operator | tMT28NXbKW0 | 30:39 | 682M |
| DEF CON Safe Mode Ham Radio Village - Eric Escobar - Talking to Satellites | XyrmdDVQN_A | 50:30 | 1G |
| DEF CON Safe Mode Ham Radio Village - Baloo - APRS Demo | fBj-HI7uyho | 38:07 | 285M |
| DEF CON Safe Mode Ham Radio Village - K0BAK - The K0BAK News Van 2 of 2 | y7MX6-I3Stc | 12:43 | 62M |
| DEF CON Safe Mode Ham Radio Village - Pancake - So you have an SDR | wDMsh7TJuqw | 51:10 | 649M |
| DEF CON Safe Mode Ham Radio Village - Swissninja - The OSTRWERK Initiative | -3ehROEVXmw | 46:08 | 1G |
| DEF CON Safe Mode Ham Radio Village - Tyler Gardner - Single Board Computers In Amateur Radio | pR_0ZA-nsdA | 45:07 | 1G |
| DEF CON Safe Mode Hardware Hacking Village - Joseph Long - HackerBox 0057 Build | 6W9r0ip_IDc | 42:06 | 551M |
| DEF CON Safe Mode Hardware Hacking Village - Farith Mauro and Luis Mendoza - Onkeypress Hack | 1shC1dbLg04 | 20:23 | 56M |
| DEF CON Safe Mode Hardware Hacking Village - Federico Lucifredi -Hardware Hacking 101 | qAxJBx8GiN0 | 50:42 | 180M |
| DEF CON Safe Mode Hardware Hacking Village - Joseph Long - Learn to Solder the Badge Buddy Kit | CI1hEpa2Zh8 | 37:39 | 293M |
| DEF CON Safe Mode ICS Village - ICS SecOps Active Defense Concept with Effective Incident Response | DcOtj8oPMJo | 31:23 | 669M |
| DEF CON Safe Mode ICS Village - Chris Kubecka - Operationalizing Cyber Norms | LE3eJeGum7E | 27:22 | 630M |
| DEF CON Safe Mode ICS Village - Demirel Temel - Playing with Electricity | H2RjbQ0YpAU | 59:25 | 1G |
| DEF CON Safe Mode ICS Village - Marie Otis - MITRE ICS ATT&CK | EphRqE09uQk | 23:21 | 500M |
| DEF CON Safe Mode ICS Village - Chris Krebs- Keynote | PENObjJR32E | 14:43 | 129M |
| DEF CON Safe Mode ICS Village - Fernandez, Gomez - Industrial Cybersecurity in Mexico | M32Y7USSGWY | 24:52 | 558M |
| DEF CON Safe Mode ICS Village - Joe Slowik - Mission Kill Process Targeting in ICS Attacks | -ch322ff4-Y | 31:18 | 214M |
| DEF CON Safe Mode ICS Village - Marina Krotofil - Confessions of an Offensive ICS Researcher | hUju8adf4MQ | 58:10 | 1G |
| DEF CON Safe Mode ICS Village - Tim Yardley - Building a Physical Testbed for Blackstart Restorat | lGPDmOjaOO4 | 57:18 | 1G |
| DEF CON Safe Mode IoT Village - Barak Sternberg - Hacking smart devices for fun and profit | l18wjygqrKM | 43:01 | 283M |
| DEF CON Safe Mode IoT Village - Besim Altinok and Anil Celik - IoT Hacking Stories in Real Life | GZsT2FgFRZ8 | 16:30 | 78M |
| DEF CON Safe Mode IoT Village - Chloé Messdaghi - How to Get Rights for Hackers | V6lElrPNntQ | 27:53 | 157M |
| DEF CON Safe Mode IoT Village - Deral Heiland - Getting Started Building an IoT Hardware Hacking Lab | ztYnPAl3kCE | 01:13:48 | 600M |
| DEF CON Safe Mode IoT Village - Deral Heiland - NAND Flash Recovering File Systems | C6munjMprzU | 01:03:21 | 393M |
| DEF CON Safe Mode IoT Village - Dewank Pant, Shruti Lohani - Your Connected World Isn't Yours Now | 4Hefeu9lxvs | 46:47 | 1M |
| DEF CON Safe Mode IoT Village - Dr Amit Bar On, Anahit Tarkhanyan Future of IoT Sec Baselines | rGNKbXIddUc | 40:48 | 207M |
| DEF CON Safe Mode IoT Village - Garrett Enochs - Introduction to U Boot Interaction and Hacking | y6tzcV_mY68 | 01:18:00 | 565M |
| DEF CON Safe Mode IoT Village - Jonathan Stines - Learning to Use Logic Analyzers | AzxjBwdK2BE | 01:15:53 | 457M |
| DEF CON Safe Mode IoT Village - Kat Fitzgerald - IoT Honeypots and Taming Rogue Appliances | tuRhD4GLRpU | 45:10 | 337M |
| DEF CON Safe Mode IoT Village - Mark Bereza - VULNtron 4 CVEs Turn a Teleconference Bot into a Spy | mxQCORr0IJk | 42:00 | 275M |
| DEF CON Safe Mode IoT Village - Matthew Byrdwell - Stepped on a Nail | JEcBhCsBJjA | 01:00:38 | 481M |
| DEF CON Safe Mode IoT Village - Netspooky - Hella Booters, Why IoT Botnets Aren't Going Anywhere | gDZoHorF42E | 44:25 | 307M |
| DEF CON Safe Mode IoT Village - Panel - The Joy of Coordinating Vulnerability Disclosure | q7R031FNjqk | 43:27 | 400M |
| DEF CON Safe Mode IoT Village - Parker Wiksell - Vulnerability Trends in the Supply Chain | Qthk-M9xVmc | 43:35 | 305M |
| DEF CON Safe Mode IoT Village - Sanjana Sarda - Kicking Devices,Taking CVEs: Zoomer Guide to Hacking | 0G2g-tLMK70 | 30:47 | 195M |
| DEF CON Safe Mode IoT Village - t1v0 - In Search of the Perfect UPnP Tool | kbnTVQg7ZOo | 29:10 | 210M |
| DEF CON Safe Mode IoT Village - Troy Brown - Pandemic In Plaintext | 11qWHjoLT5U | 20:43 | 145M |
| DEF CON Safe Mode Lock Bypass Village - Robert Graydon - DIY Bypass Tools | EzL72_OzMK0 | 18:01 | 91M |
| DEF CON Safe Mode Lock Bypass Village - Bill Graydon - Alarms and Access Controlled Doors | hGUMUG9VLKU | 53:53 | 277M |
| DEF CON Safe Mode Lock Picking Village - Jared Dygart - Safecracking for Everyone | hjT-H_S2XAE | 39:05 | 197M |
| DEF CON Safe Mode Lock Picking Village - Austin Marck - Keystone to the Kingdom | CN-oeROUYnk | 26:47 | 633M |
| DEF CON Safe Mode Lock Picking Village - John the Greek - Bobby Pins, More Effective Than Lockpicks | Y34oVq5juQ4 | 23:39 | 461M |
| DEF CON Safe Mode Lock Picking Village - N∅thing - How I defeated the Western Electric 30c | wHpXsmnd-XA | 48:29 | 512M |
| DEF CON Safe Mode Lock Picking Village - N∅thing - Intro to High Security Locks and Lockpicking | XLCO_Ev6e_4 | 58:59 | 1G |
| DEF CON Safe Mode Lock Picking Village - Preston Thomas - Law School for Lockpickers | HGg9mypLcH0 | 28:28 | 112M |
| DEF CON Safe Mode Lock Picking Village - Steven Collins - Cuff Stuff | i_e4anGal1w | 07:58 | 26M |
| DEF CON Safe Mode Lockpick Village - Preston Thomas -Intro To Lockpicking | oZe7uvVmG7c | 22:34 | 100M |
| DEF CON Safe Mode Monero Village - rehrar - Monero Wallet Basics | U5PyZT0VUwU | 29:44 | 131M |
| DEF CON Safe Mode Monero Village - ArticMine - Transaction Capacity and Fees | a206226v9zY | 27:06 | 117M |
| DEF CON Safe Mode Monero Village - rehrar - Closing Talk | mc-BHxjmu2U | 05:37 | 57M |
| DEF CON Safe Mode Monero Village - Sarang - Open Office Q&A | rhwD4c86CfI | 52:56 | 1G |
| DEF CON Safe Mode Monero Village - Meme Competition | cqsDml_A9LU | 01:22:55 | 780M |
| DEF CON Safe Mode Monero Village - Michael - Badge Clinic 2 | kKqTs5qXjjk | 58:48 | 604M |
| DEF CON Safe Mode Monero Village - Michael Schloh von Bennewitz - Badge Clinic | rADsW7_TCo0 | 56:45 | 499M |
| DEF CON Safe Mode Monero Village - Monero Trivia | eM0mq30DQdc | 36:17 | 110M |
| DEF CON Safe Mode Monero Village - Randy Brito - Locha Mesh: Monero Off the Grid | m9G0tQZhQDI | 22:47 | 98M |
| DEF CON Safe Mode Monero Village - rehrar - Decentralization in a Centralized World | NSFDlF95GhI | 31:35 | 72M |
| DEF CON Safe Mode Monero Village - rehrar - Welcome Talk | i5UHDpNReVw | 04:58 | 117M |
| DEF CON Safe Mode Monero Village - Reuben - Zcoin Competition | gb1TJjg_gJg | 26:25 | 51M |
| DEF CON Safe Mode Monero Village - sgp - You're Not the Money Printer Coinbase Outputs | 64t7Z5p3yIo | 25:40 | 65M |
| DEF CON Safe Mode Monero Village - zkao - Bitcoin Monero Atomic Swaps | QdPgAl3nBH8 | 29:06 | 125M |
| DEF CON Safe Mode Packet Hacking Village - Catherine Ullman - Dumpster Fires 6 Things About IR | sBHCKuwjtwk | 41:11 | 232M |
| DEF CON Safe Mode Password Village - Lets crack rockyou txt without using rockyou txt | 8FtXntEsZdU | 01:49:38 | 1G |
| DEF CON Safe Mode Password Village - Dr Matt Weir - Practical PCFG Password Cracking Q⧸A | uGpOLOjHp_I | 11:39 | 279M |
| DEF CON Safe Mode Password Village - Dr Matt Weir - Practical PCFG Password Cracking | rri9vBYR60M | 46:05 | 1G |
| DEF CON Safe Mode Password Village - EvilMog - From Printers to Silver Tickets | M9htSTug9TQ | 12:25 | 217M |
| DEF CON Safe Mode Password Village - Getting Started with Hashcat | Gr_1_LDUZSY | 23:49 | 296M |
| DEF CON Safe Mode Password Village - Hank Leininger - PathWell Dynamic Password Strength Enforcement | -712GV6mtRY | 50:29 | 1G |
| DEF CON Safe Mode Password Village - Jeremi Gosney - Cracking at Extreme Scale | 4Ell1Tt23NI | 40:33 | 274M |
| DEF CON Safe Mode Payment Village - Aleksei Stennikov - PoS Terminal Security Uncovered | gtbS3Gr264w | 34:36 | 119M |
| DEF CON Safe Mode Payment Village - Arkadiy Litvinenko - Online Banking Security | X0ZnVVxy04U | 51:58 | 218M |
| DEF CON Safe Mode Payment Village - Leigh Anne Galloway - Welcome to the Payment Village | EI14PtTmOzI | 04:27 | 30M |
| DEF CON Safe Mode Payment Village - Menaka BaskerPillai - Architecting Modern Payment Gateways | vgJ6ZdwPoqA | 34:03 | 180M |
| DEF CON Safe Mode Payment Village - Steven Murdoch - Making Sense of EMV Card Data | uOR508ZN2qY | 37:52 | 128M |
| DEF CON Safe Mode Payment Village - Uri Rivner - Identity Crisis: Online Account Opening Fraud | Mvsb_Z1Xorw | 40:44 | 102M |
| DEF CON Safe Mode Recon Village - Mauro Eldritch - COVID 1984 Propaganda⧸Surveillance in a Pandemic | C-RglDXbYjc | 31:11 | 94M |
| DEF CON Safe Mode Recon Village - Chloe Messdaghi - Burnout is Real | JeS-z9P8afg | 39:17 | 98M |
| DEF CON Safe Mode Recon Village - Ladislav Baco - Hunting for Blue Mockingbird Coinminers | iI077rK6HPI | 24:20 | 91M |
| DEF CON Safe Mode Recon Village - Levi - Ambly the Darknet Spider | M2GBkLanb-8 | 45:21 | 294M |
| DEF CON Safe Mode Recon Village - Master Chen - Twitter Word Phrequency | wLnONhbqgXE | 31:39 | 88M |
| DEF CON Safe Mode Recon Village - Mauro Eldritch - COVID 1984 Pandemic Propaganda and Surveillance | Qqy1RiasOR4 | 31:11 | 73M |
| DEF CON Safe Mode Red Team Village - Ali Abdollahi - Bypassing in Mobile Network from Red Team POV | ASS4GlpwuGA | 23:22 | 181M |
| DEF CON Safe Mode Red Team Village - Chris Kubecka - Pwn the World | JHrrOGjHiXQ | 57:25 | 477M |
| DEF CON Safe Mode Red Team Village - Eduardo Arriols - Catch Me if You Can | l5Y-laZRDPs | 01:00:08 | 488M |
| DEF CON Safe Mode Red Team Village - Evan Anderson - Gray Hat SSH SSHenanigans | asm1GoNYObM | 50:54 | 341M |
| DEF CON Safe Mode Red Team Village - Jason Haddix - The Bug Hunters Methodology | qPlpN4BVnRY | 01:16:00 | 671M |
| DEF CON Safe Mode Red Team Village - Kürşat Akıncı, Mert Can Coşkuner -Android Malware Adventures | Ba8XfRYOvsE | 22:17 | 178M |
| DEF CON Safe Mode Red Team Village - Mendoza, Cáseres - Sounds Legit Don't Trust That Speaker | 2nH3L4vlDVE | 35:29 | 361M |
| DEF CON Safe Mode Red Team Village - Adam Pennington - Emulating Adversary w Imperfect Intelligence | cXlWY3OnjO0 | 57:24 | 460M |
| DEF CON Safe Mode Red Team Village - Allie Mellen - Trust but Verify Maintaining Democracy | 99Ugm92xW2E | 35:48 | 240M |
| DEF CON Safe Mode Red Team Village - Alvaro Ruedo - Total E(A)gression | ZxKLbij9XCM | 22:29 | 178M |
| DEF CON Safe Mode Red Team Village - Ankur Chowdhary - Autonomous Security Analysis & Pentesting | HnKh1-nyaTg | 48:12 | 359M |
| DEF CON Safe Mode Red Team Village - Anthony Rose, Jake Krasnov - APTs ❤️PowerShell You Should Too | GhfiNTsxqxA | 59:36 | 478M |
| DEF CON Safe Mode Red Team Village - Apurv Gautam - AutomatingThreat Hunting on the Dark Web | jE_Lak6xrg0 | 45:31 | 298M |
| DEF CON Safe Mode Red Team Village - Ch33r10 - Indicators of Emulation Spicy Adversary Emulation | 7WUDnFleC5Y | 45:05 | 386M |
| DEF CON Safe Mode Red Team Village - Chloe Messdaghi - The Art of Balancing a Burnout Talk | GHs7ZBMlPZs | 51:57 | 362M |
| DEF CON Safe Mode Red Team Village - Chris Cottrell - Guerrilla Red Team Decentralizing Adversary | rEXh3TAZTtk | 54:40 | 457M |
| DEF CON Safe Mode Red Team Village - Chris Wysopal - Red Teaming: Born from the Hacking Community | 1RvzPtwy_tQ | 30:06 | 223M |
| DEF CON Safe Mode Red Team Village - Corey Ham, Matt Eidelberg - Breaking the Attack Chain | -JPevbBHIOY | 58:21 | 418M |
| DEF CON Safe Mode Red Team Village - Daniel Miessler - Mechanizing Methodology Automating Discovery | L_qoz2_Qyhk | 19:40 | 148M |
| DEF CON Safe Mode Red Team Village - Erdener Uyan, Gökberk Gülgün -Executing Red Team Scenarios | QouX0zVE434 | 35:19 | 269M |
| DEF CON Safe Mode Red Team Village - Forrest Fuqua - What College Kids Always Get Wrong | u5QtuuMNYFo | 49:24 | 526M |
| DEF CON Safe Mode Red Team Village - Gabriel Ryan - dropengine Malleable Payload Creation Framework | iiK2vBRMMSs | 53:45 | 393M |
| DEF CON Safe Mode Red Team Village - Guillermo Buendia - Swift SPID SPEI Basic Hacking Techniques | UsBMPasl7eQ | 24:28 | 209M |
| DEF CON Safe Mode Red Team Village - Ibad Shah - From Discovery to Disclosure | WD--zLozFOI | 15:00 | 89M |
| DEF CON Safe Mode Red Team Village - Jonathan Helmus - Student Roadmap to Becoming a Pentester | V4hti6UlCf0 | 01:00:44 | 485M |
| DEF CON Safe Mode Red Team Village - Jorge Orchilles - Deep Dive into Adversary Emulation Ransomware | TelqSCdwi10 | 46:11 | 424M |
| DEF CON Safe Mode Red Team Village - Justin Hutchens - Bypassing Multifactor Auth w⧸ Realtime Replay | cXZHtMM8JYw | 42:49 | 411M |
| DEF CON Safe Mode Red Team Village - Kat Fitzgerald - Securing and Pentesting k8s Monster | kYfVc1y94jA | 52:30 | 397M |
| DEF CON Safe Mode Red Team Village - Kaustubh - Offensive Embedded Exploitation | pL0w-dECE1I | 01:06:15 | 511M |
| DEF CON Safe Mode Red Team Village - Kyle Benac - Android Application Exploitation | UbT1KRxq9GQ | 01:00:37 | 489M |
| DEF CON Safe Mode Red Team Village - Lee Wangenheim - Modern Password Cracking as a Methodology | MrIuEDjp94o | 50:49 | 459M |
| DEF CON Safe Mode Red Team Village - Leron Gray - Bypass Python 38 Audit Hooks or Nah? | 92O_kBDD_aw | 40:12 | 401M |
| DEF CON Safe Mode Red Team Village - Madhu Akula - Kubernetes Goat Vulnerable by Design | aEaSZJRbnTo | 57:00 | 607M |
| DEF CON Safe Mode Red Team Village - Mathy Vanhoef - Protecting WiFi Beacons from Outside Forgeries | hs2Md7407c0 | 20:10 | 133M |
| DEF CON Safe Mode Red Team Village - Mauro Casere - Evil Genius Why You Shouldnt Trust that Keyboard | S8geErf2Sos | 22:45 | 158M |
| DEF CON Safe Mode Red Team Village - Mazin Ahmed - Hacking Zoom a Hackers Journey into Zoom Sec | sKDbcwHTrWA | 52:51 | 552M |
| DEF CON Safe Mode Red Team Village - Mert Coskuner- RedTeamOps Managing Red Team Infrastructure | Pk9o7FtUXeM | 23:45 | 168M |
| DEF CON Safe Mode Red Team Village - Michael Wylie - Enumerating Cloud File Storage Gems | xUbKyFw-lds | 52:48 | 348M |
| DEF CON Safe Mode Red Team Village - NahamSec, Barnes - Knock Knock Identifying Assets in the Cloud | bWtGC6-tqDs | 59:05 | 441M |
| DEF CON Safe Mode Red Team Village - Nicolas Mattiocco - Red Flavour of SOC Automation | O9WR2YEs0Zk | 45:05 | 303M |
| DEF CON Safe Mode Red Team Village - Noa Novogroder - Back to the Future CompSci and System Biology | UoEBtwk-_a0 | 01:04:06 | 684M |
| DEF CON Safe Mode Red Team Village - Petros Koutrompis - OU Having a Laugh - | qUbDWzqhA4Y | 30:16 | 221M |
| DEF CON Safe Mode Red Team Village - Phillip Wylie - Inside the Mind of a Threat Actor | k8-G6oCHNHM | 38:26 | 258M |
| DEF CON Safe Mode Red Team Village - Ray Doyle - Weaponized XSS Moving Beyond Alert | ksq7e6UUDag | 38:41 | 350M |
| DEF CON Safe Mode Red Team Village - Rod Soto - Have My Keys Been Pwned API Edition | BrDXfmQF1Ec | 42:24 | 392M |
| DEF CON Safe Mode Red Team Village - Ryan Ekins - Notebooks Datasets & Clouds for Automation | Pc7h9S_UTac | 52:24 | 749M |
| DEF CON Safe Mode Red Team Village - Sajal Thomas - Modern Red Team Tradecraft | POrREdNw7j8 | 01:00:00 | 430M |
| DEF CON Safe Mode Red Team Village - Shay Nehmad - Making Breach and Attack Simulation Accessible | A2FQNBwBwD8 | 51:18 | 698M |
| DEF CON Safe Mode Red Team Village - Tim Wadhwa-Brown - All of the Threats Intelligence Modeling | 7ryw3A_pFGY | 51:00 | 367M |
| DEF CON Safe Mode Red Team Village - Travis Palmer - Passwd Cracking Beyond 15 Chars, Under $500 | _bYDbr853Uw | 42:17 | 350M |
| DEF CON Safe Mode Red Team Village - Tyler Boykin - 50 Shades of Sudo Abuse | C5MvdBM6Nq8 | 57:46 | 452M |
| DEF CON Safe Mode Red Team Village - Vandana Sehgal - Zero Trust a Vision for Securing Cloud | euSsqXO53GY | 38:27 | 256M |
| DEF CON Safe Mode Red Team Village - Walter Cuestas - Initial Compromise Through Web Side | xxPe2X_hbOY | 41:02 | 288M |
| DEF CON Safe Mode Red Team Village -Austin Marck - erpwnage Red Team Approach to Targeting SAP | 1v8jOr3ju94 | 23:53 | 233M |
| DEF CON Safe Mode Red Team Village -Pablo Gonzalez - ATTPwn Adversarial Emulation | 0lE5oHqZV0s | 45:56 | 379M |
| DEF CON Safe Mode Rogues Village - 0x90 - Outs Forces and Equivoque: How Magicians Speak | Br0bkfRmWFQ | 57:33 | 609M |
| DEF CON Safe Mode Rogues Village - James Harrison - Pickpocketing at Home | 9rS8emBPz6I | 33:58 | 524M |
| DEF CON Safe Mode Rogues Village - Simon Weckert - Google Maps Hacks | OfiolrXZirE | 32:20 | 315M |
| DEF CON Safe Mode Voting Village - A Panel with the Feds on Election Security (intro only) | LAPHhT5q5dY | 04:01 | 7M |
| DEF CON Safe Mode Voting Village - Chairman Benjamin Hovland - US Election Assistance Commission | ENh9k2Wsr30 | 16:55 | 55M |
| DEF CON Safe Mode Voting Village - Senator Ron Wyden | d8lcsf510GE | 13:12 | 55M |
| DEF CON Safe Mode Voting Village - A Panel with the Feds on Election Security Introduction | r8eJLT9Byvg | 04:01 | 7M |
| DEF CON Safe Mode Voting Village - Ben Dubow - How Influence Warfare Subverts Democracy | OVvHZAUlIvU | 22:35 | 71M |
| DEF CON Safe Mode Voting Village - BiaSciLab - Don't Go Postal | fdRC26RF27I | 17:30 | 78M |
| DEF CON Safe Mode Voting Village - BiaSciLab - Don't Go Postal | 7PjeC4UGexs | 17:30 | 82M |
| DEF CON Safe Mode Voting Village - Cable, Zaheer - Heightened Election Sec Risks Amidst a Pandemic | Xmoo1UvxRjk | 24:55 | 70M |
| DEF CON Safe Mode Voting Village - Cordero Delgadillo - A Lawyer's Reflections on Elections | rFgT-Kv_UFo | 37:33 | 212M |
| DEF CON Safe Mode Voting Village - Day 1 Closing Remarks | JQhYmGs1dYg | 30:12 | 211M |
| DEF CON Safe Mode Voting Village - Day 1 Opening Remarks | w-BD1fmaRco | 27:06 | 215M |
| DEF CON Safe Mode Voting Village - Forrest Senti, Mattie Gullixson - Secure the Vote Standards | G9tzo93e1yU | 14:49 | 46M |
| DEF CON Safe Mode Voting Village - Jody Westby - Policy Approach to Resolving Cybersecurity Problems | 1MIna3Fy3mU | 29:20 | 82M |
| DEF CON Safe Mode Voting Village - John Odum - Security Challenges Posed by State | L_gnJzpqbL8 | 29:13 | 163M |
| DEF CON Safe Mode Voting Village - Kylee Zabel | H6BCMYR9_WQ | 26:33 | 99M |
| DEF CON Safe Mode Voting Village - Michael A Specter - The Ballot is Busted before the Blockchain | _FHHXJ1AVm4 | 26:46 | 57M |
| DEF CON Safe Mode Voting Village - Nimit Sawhney - Analysis of Data from Mobile Voting Pilots | r-FDnr8po2A | 23:29 | 85M |
| DEF CON Safe Mode Voting Village - Panel - A Panel With The Feds on Election Security | JxkIwLVTxlk | 01:00:35 | 993M |
| DEF CON Safe Mode Voting Village - Philip Stark intro only | 0ae0Ez85L1k | 01:10 | 1M |
| DEF CON Safe Mode Voting Village - Rep Jackie Speier - Voting Village Keynote Remarks | e5aw3_hqg4c | 16:40 | 57M |
| DEF CON Safe Mode Voting Village - Sang Oun Lee - Review of Remote Voting in Response to COVID-19 | UF5RhUXqkBQ | 18:22 | 33M |
| DEF CON Safe Mode Voting Village - Secure the Vote - Hack a Fax | mcb1w5OQwRs | 16:22 | 25M |
| DEF CON Safe Mode Voting Village - Stark Xie -Testing Can't Tell If Ballot Devices Alter Elections | 608X-5oVLZw | 24:21 | 60M |
| DEF CON Safe Mode Voting Village - Stephanie Singer - Protecting Elections with Data Science | F3xvQvpOuec | 28:48 | 152M |
| DEF CON Safe Mode Voting Village - Steve Newell - Leveraging Electronic Balloting Options in COVID | M-Glp9LPBbg | 18:06 | 59M |
| DEF CON Safe Mode Voting Village - Susan Greenhalgh - Remote Online Balloting Delivery | FR_f22NdIp4 | 18:06 | 56M |
| DEF CON Safe Mode Wireless Village - FreqyXin - The Basics Of Breaking BLE v3 | X2ARyfjzxhY | 01:10:19 | 582M |
| DEF CON Safe Mode Wireless Village - Eric Escobar - Wireless Blue Team | NtiqbJi33EY | 23:25 | 143M |
| DEF CON Safe Mode Wireless Village - cemaxecuter - DragonOS How I kept busy during COVID19 | JHD9whqzzK4 | 30:30 | 321M |
| DEF CON Safe Mode Wireless Village - wifisecguy - Introduction to WiFi Security | YzFGBGWKAlE | 01:06:07 | 475M |
| DEF CON Safe Mode Wireless Village - wytshadow - Wicked Wardriving with gps and glonass | swCSBFO-w6M | 33:21 | 348M |
| DEF CON Safe ModeBlockchain Village - Peiyu Wang - Exploit Insecure Crypto Wallet | oJaNiXVvE88 | 30:56 | 49M |
| DEF CON Safe ModeBlue Team Village - Olaf Hartong, Mauricio Velazco - Purple On My Mind | aJf2jPTqkVM | 01:05:09 | 350M |
| DEF CON SE VILLAGE - Silvers and Banks - On the Hunt Hacking the Hunt Group | vgKAxd_4s0A | 50:55 | 344M |
| DEF COPN 32 - 0 0 0 0 Day Exploiting Localhost APIs From The Browser - Avi Lumel skyGal Elbaz | GAEOBhsqJI4 | 27:14 | 146M |
| DEFCON 29 IoT Village - Alexi Kojenov - I used AppSec Skills to Hack IoT and So Can You | P6dI2IFI340 | 39:08 | 161M |
| DEFCON 29 IoT Village - Cheryl Biswas - Mind the Gap Managing Insecurity in Enterprise IoT | wQd63Tb7C_Q | 42:37 | 316M |
| DEFCON 29 IoT Village - Elazari Tarkhanyan and Cheruvu - Establishing IoT Trustworthiness | CqWr9kC6nMw | 46:19 | 243M |
| DEFCON 29 IoT Village - Hadad and Kaufman - Reverse Supply Chain Attack | nGwZ6qbQCKY | 25:49 | 173M |
| DEFCON 29 IoT Village - Harshit Agrawal - Defending IoT in the Future of High Tech Warfare | Rh8IZhhUKV8 | 52:25 | 417M |
| DEFCON 29 IoT Village - Hutch - Alexa Have You Been Compromised | iVKYA774LJc | 40:35 | 259M |
| DEFCON 29 IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days | xUb190HQtjA | 42:49 | 300M |
| DEFCON 29 IoT Village - Juneau - Strategic Trust and Deception in the Internet of Things | cR1c2wRU4G0 | 20:01 | 91M |
| DEFCON 29 IoT Village - Ken Pyle - BLUEMONDAY Series Exploitation and Mapping of Vulnerable Devices | 3cfGguMi9IU | 53:44 | 377M |
| DEFCON 29 IoT Village - Messdaghi and Eddy - Representation Matters | JGD22OzD39M | 33:14 | 313M |
| DEFCON 29 IoT Village - Petro and Cecil - You're Doing IoT RNG | dzS1Zf-1Uzo | 40:04 | 294M |
| DEFCON 29 IoT Village - Ria Cheruvu - Ethics at the Edge | KN_mA-RpiRs | 30:22 | 231M |
| DEFCON 29 IoT Village - Ross and Balazs - MIPS X the Next IoT Frontier | V5P2eEhhwUU | 33:22 | 239M |
| DEFCON 29 IoT Village - Sessler and Hendricks - IoT Devices as Government Witnesses | 7ymcofBUPWc | 37:25 | 364M |
| DEFCON 29 IoT Village - Ted Harrington - When Penetration Testing Isn't Penetration Testing At All | JfXNqQQgImU | 30:08 | 185M |
| DEFCON 29 IoT Village - Tim Jensen EapolSniper - IoT Testing Crash Course | SUtDb3ZaPqY | 46:47 | 237M |
| DEFCON 29 IoT Village - Victor Hanna - LED Light Lunacy | NGkRPpwWDLM | 28:55 | 198M |
| DEFCON 29 IoT Village - Waylon Grange - 1.21 Gigawatts Vulnerabilities in Solar Panels | HyZLKIHU9v8 | 28:57 | 231M |
| DEFCON 33 Video Team - AIxCC with ShellPhish | PiJwIUGJGmw | 32:37 | 256M |
| DEFCON Documentary Teaser Trailer | 7s1j1cBw55E | 03:44 | 34M |
| DEFE CON 33 - Deploying Deception in Depth for ICS - Brent Muir | _ghyf3J92UQ | 22:18 | 103M |
| Dennis Giese - Privacy leaks Extracting data from used smart home devices - DEF CON 27 IoT Village | Iit4SmzQ2Uo | 46:20 | 302M |
| Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek - DEF CON 27 Conference | Ed-LTOZmCeA | 47:26 | 235M |
| Dirk jan Mollema - Im In Your Cloud Pwning Your Azure Environment - DEF CON 27 Conference | xei8lAPitX8 | 42:05 | 245M |
| Douglas McKee - HVACking Understand the Delta Between Security and Reality - DEF CON 27 Conference | uJP061PUxgY | 40:06 | 333M |
| Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference | PMihX693mPE | 22:21 | 230M |
| droogie - Go NULL Yourself - DEF CON 27 Conference | TwRE2QK1Ibc | 23:57 | 324M |
| Edward Miro - Rideshare OSINT CarBased SE For Fun and Profit - DEF CON 27 Social Engineering Village | ozQXIMbuUG8 | 28:27 | 223M |
| Elie Bursztein - Deep Learning Revolutionizing Side Channel Cryptanalysis - DEF CON 27 Conference | QXTricqAtPk | 40:20 | 401M |
| Elliott Thompson - MI CASA SU CASA My 19216811 is Your 19216811 - DEF CON 27 Conference | JGezOYIfOWQ | 36:50 | 550M |
| Elvis Collado - Greenwaves and Ham - DEF CON 27 IoT Village | e1_vfnnsesw | 37:27 | 274M |
| Emilio Couto - CIRCO Cisco Implant Raspberry Controlled Ops - DEF CON 27 Packet Hacking Village | G-ZRdMpVuWY | 50:10 | 345M |
| Eric Johnson - Wi Fi 6 Deep Dive - DEF CON 27 Wireless Village | 73q3kVKzBmc | 01:16:17 | 307M |
| Eric Reuter - Reversing Wireless model railroad control system - DEF CON 27 Wireless Village | AJHfl6Dmo7g | 17:54 | 80M |
| Ethan Dodge - Scrubber An OSS compilation to protect sources - DEF CON 27 Crypto and Privacy Village | 75dATldR3Yg | 18:30 | 127M |
| Evolution of the Hacker Community in Asia - Jayson Street - DEF CON China Beta | RWdNvt4KYgE | 35:36 | 135M |
| Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera - DEF CON 27 Conference | q1xTJO6ZnC0 | 43:16 | 251M |
| finalphoenix - Rise of the Hypebots Scripting Streetwear - DEF CON 27 Conference | RsC4VGztDlg | 43:40 | 416M |
| Flipping Locks - Remote Badge Cloning with the Flipper Zero and More - Langston Clements & Dan Goga | ro-EkKjj_wc | 37:03 | 115M |
| g richter - Reverse Engineering 4g Hotspots for Fun Bugs Net Financial Loss - DEF CON 27 Conference | MD9zS1GMlK8 | 41:38 | 214M |
| Gerald Doussot - State of DNS Rebinding Attacks & Singularity of Origin - DEF CON 27 Conference | y9-0lICNjOQ | 42:02 | 290M |
| Gleb Esman - Solving Crimes with Wireless GeoFencing - DEF CON 27 Packet Hacking Village | GJAsALPHnkY | 49:10 | 324M |
| Gregory Pickett - Breaking the Back End Sometimes it's Just Bad Design - DEF CON 27 Conference | z5cXNLeTn9U | 23:54 | 245M |
| Guillemo Pilleux - Hacking Wi Fi - DEF CON 27 Wireless Village | 4a_f23Me1Qg | 51:42 | 281M |
| Hacker History Project - The Dark Tangent Interviewed at DEF CON 5 - courtesy of ZDnet | ohXjTIAmo1U | 06:48 | 27M |
| Hadrian Barral - The ABC of Next Gen Shellcoding - DEF CON 27 Conference | qHj1kquKNk0 | 36:15 | 325M |
| Hak5Crew - Introducing new Hak5 gear - DEF CON 27 Wireless Village | gj6DnxkjuIM | 49:22 | 282M |
| Harlo Holmes - Tiplines Today - DEF CON 27 Crypto and Privacy Village | trFQj6fEic4 | 54:15 | 370M |
| Hila Cohen, Amit Waisel - Malproxy Leave Your Malware at Home - DEF CON 27 Conference | GYZx0oJU1nI | 37:35 | 254M |
| Hyejin Jeong - HACK DMI PWNING HDMI FOR FUN AND PROFIT - DEF CON 27 IoT Village | kDlA3hVB9Os | 33:59 | 112M |
| I Am Groot: Examining the Guardians of Windows 10 Security - Chuanda Ding - DEF CON China Beta | a0AB76YNMlQ | 23:26 | 170M |
| Itzik Kotler - Process Injection Techniques Gotta Catch Them All - DEF CON 27 Conference | Gq6-1xrmFHQ | 47:57 | 477M |
| Jack Baker - Hacking WebAssembly Games with Binary Instrumentation - DEF CON 27 Conference | Sa1QzhPNHTc | 38:16 | 266M |
| Jacob Baines - Help Me Vulnerabilities You're My Only Hope - DEF CON 27 Conference | mST-9k6m3ug | 42:13 | 318M |
| Jaime Sanchez - Derevolutionizing OS Fingerprinting cat and mouse game - DEF CON 27 Recon Village | psxxT00KavM | 32:41 | 167M |
| Jatin Kataria - 100 seconds of Solitude Defeating Cisco Trust Anchor - DEF CON 27 Conference | T3VPvPTrwB0 | 48:08 | 586M |
| Jay Beale - Attacking and Defending Kubernetes - DEF CON 27 Packet Hacking Village | 2fmAuR3rnBo | 54:50 | 311M |
| Jay Dimartino - The Art of Detection - DEF CON 27 Packet Hacking Village | 68-sFqv4FJE | 43:58 | 152M |
| Jayson Grace - MOSE Using Configuration Management for Evil - DEF CON 27 Conference | cA0LGfxQS2g | 41:57 | 319M |
| Jayson Interviews Adrian from DC2744, Garden Route South Africa | fHRgB6x78d4 | 03:09 | 117M |
| Jayson Street - I PWN thee I PWN thee not - DEF CON 27 Social Engineering Village | D5kg3jZ0Kcw | 50:12 | 488M |
| Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 Conference | yrrxFZfyEsw | 46:59 | 357M |
| Jeff Foley - Advanced Recon with OWASP Amass video - DEF CON 27 Recon Village | ES6OKjgW36w | 29:18 | 203M |
| Jeff Man - Rethinking Security Given the Spectre of a Meltdown - DEF CON 27 Packet Hacking Village | BitqDHxlxYc | 53:36 | 327M |
| Jens Muller - Covert Attacks on Email End-to-End Encryption - DEF CON 27 Conference | 2vFMSJLaOOQ | 22:42 | 112M |
| Jesse Michael - Get Off the Kernel if You Can't Drive - DEF CON 27 Conference | tzWq5iUiKKg | 48:49 | 451M |
| Jiska - Vacuum Cleaning Security Pinky and The Brain Edition - DEF CON 27 Conference | k5nj7Jhwn9c | 23:58 | 159M |
| Jmaxxz - Your Car is My Car - DEF CON 27 Conference | w8SG2V3n4-U | 41:03 | 653M |
| Joe Grand - Behind the Scenes of the DEF CON 27 Badge - DEF CON 27 Conference | gnZQcWIX02A | 56:06 | 385M |
| Joe Gray- DECEPTICON OPSEC to Slow the OSINT video - DEF CON 27 Recon Village | nB6XFIYGg5o | 40:44 | 350M |
| Joseph Cox - How You Can Buy ATT TMobile and Sprint Real Time Location Data - DEF CON 27 Conference | 3e6n7jDDmj0 | 38:35 | 597M |
| Joseph Muniz- Old Tech vs New Adversaries Round 1 - DEF CON 27 Packet Hacking Village | oP6Ch4gLcV0 | 31:59 | 138M |
| Josh Steinman - NSC and Special Assistant for Cyber - DEF CON 27 Hack the Sea Village | Iw2gA4MOW7s | 17:55 | 122M |
| Joshua Maddux - API Induced SSRF How ApplePay Scattered Vulns Across the Web - DEF CON 27 Conference | m4BxIf9PUx0 | 40:47 | 203M |
| Julian Blanco - C2 over Maritime AIS and commercial aggregation - DEF CON 27 Hack the Sea Village | wRWh6FVIFeo | 16:41 | 95M |
| Junyu Zhou - Web2Own Attacking Desktop Apps fromWeb Security's Perspective - DEF CON 27 Conference | uXUA24xJsRQ | 37:30 | 415M |
| Kala Kinyon - Use Responsibly Recon Like an insider threat for Best User - DEF CON 27 Recon Village | ypV1jAw7xzg | 21:39 | 92M |
| Karl Koscher - Enabling HTTPS for home network devices - DEF CON 27 Crypto and Privacy Village | axid9LMWExM | 20:31 | 71M |
| Kate Rose - Adversarial Fashion Sartorial Hacking - DEF CON 27 Crypto and Privacy Village | jVcGZ_Ak4NI | 49:46 | 130M |
| Katelyn Bowden - Fighting non consensual pornography - DEF CON 27 Crypto and Privacy Village | R1LaCiK6Q90 | 47:49 | 184M |
| Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror - DEF CON 27 Conference | 9roY9yBFddc | 40:58 | 431M |
| Kent Britain⧸WA5VJB - Antennas for Surveillance - DEF CON 27 Wireless Village | vaQYt7KcVDQ | 28:10 | 101M |
| Kyle Gwinnup - Next Generation Process Emulation with Binee - DEF CON 27 Conference | z4OvVFw5pYI | 43:50 | 366M |
| Lee Brotherston - A Glorious Celebration of IoT Security - DEF CON 27 IoT Village | PfBMKOannnI | 27:31 | 128M |
| Lennart Koopmann - nzyme - A New WiFi Defense System - DEF CON 27 Wireless Village | HUX5vA6VGLs | 38:02 | 176M |
| Leon Jacobs - Meticulously Modern Mobile Manipulations - DEF CON 27 Conference | 7LKXSYFrYAM | 36:43 | 302M |
| Lessons learned from five years of DEF CON CTF - Vito Genovese - DEF CON China Beta | GZ6Zk1tP9JU | 32:37 | 257M |
| M Can Kurnaz - Your next roadtrip free - vulnerable EV charging points - DEF CON 27 IoT Village | o06fhoRb__A | 16:01 | 97M |
| m1n1 - Hunting Mobile Rogue Access Points with Wireless Mesh Implants - DEF CON 27 Wireless Village | oTcitUA9mhg | 46:02 | 224M |
| Maksim Shudrak - How To Improve Coverage Guided Fuzzing Find New 0days - DEF CON 27 Conference | 4BkAxMfHSzI | 40:30 | 428M |
| Marcus Liotta - Leveraging the Insider Threat - DEF CON 27 Social Engineering Village | fLmgP2h5O8s | 31:10 | 204M |
| Marina Simakov - Relaying Credentials has Never Been Easier - DEF CON 27 Conference | vIISsfLh4iM | 44:26 | 297M |
| Mark B Cooper - PKI and SHAKEN STIR Will Fix Robocalls - DEF CON 27 Crypto and Privacy Village | rH0X6-lxygk | 55:35 | 221M |
| Martin Vigo - From Email Address to Phone Number - DEF CON 27 Recon Village | 13gPxMUKYPE | 24:53 | 236M |
| Master Chen - A URL Shortened By Any Other Name video - DEF CON 27 Recon Village | DEbnP0bmq3Y | 24:03 | 163M |
| Matt Nash - Head in the Clouds - DEF CON 27 Packet Hacking Village | bWfDNcibdIY | 37:41 | 130M |
| Matt Wixey - Sound Effects Exploring Acoustic Cyberweapons - DEF CON 27 Conference | ftCULiYV7Wg | 36:47 | 286M |
| Maxwell Dulin - Hacking the Zyxel NAS 326 from the Perspective of a n00b - DEF CON 27 IoT Village | tzl-0vmOiMQ | 28:36 | 176M |
| Micah Zenko - Red Teaming Insights and Examples from Beyond - DEF CON 27 Social Engineering Village | TGzMR9GfnIs | 29:51 | 157M |
| Michael Leibowitz - EDR is Coming Hide Yo Sh!t - DEF CON 27 Conference | q2KUufrjoRo | 45:06 | 395M |
| Michael Raggo - Spy versus Spy who is watching who - DEF CON 27 IoT Village | I4oGquBGBRM | 28:11 | 110M |
| Michael Stepankin - Apache Solr Injection- DEF CON 27 Conference | xf2E64o4hWc | 16:20 | 117M |
| Mike Kiser - Ensuring Privacy through Obfuscation - DEF CON 27 Crypto and Privacy Village | U1wb4_bIVbc | 49:30 | 236M |
| Mike Raggo - StegoAugmented Malware - DEF CON 27 Packet Hacking Village | SS6v3g87nos | 41:51 | 166M |
| Mike Spicer - I Know What U Did Last Summer 3 Yrs Wireless Monitoring DEFCON - DEF CON 27 Conference | xfau16cyzMM | 20:20 | 85M |
| Mitchell Parker - Building OSINT and Recon Program to address Healthcare - DEF CON 27 Recon Village | 2rS7E5ObCmk | 40:22 | 176M |
| Nicolas Oberli - Poking the S in SD Cards - DEF CON 27 Conference | TlLdqqVa4eI | 20:25 | 176M |
| Nikhil Mittal - RACE Minimal Rights and ACE for Active Directory Dominance - DEF CON 27 Conference | M7Z5h6reGc4 | 36:29 | 223M |
| Nina Kollars - Confessions of an Nespresso Money Mule - DEF CON 27 Conference | 2IT2oAzTcvU | 19:55 | 123M |
| Nishant Sharma - Developing Wifi Access Point - DEF CON 27 Wireless Village | 36NBthgdN-c | 48:31 | 335M |
| Olivier Bilodeau - Industry of Social Media Manipulation Driven by Malware - DEF CON 27 Conference | F9pR37dos8M | 49:24 | 167M |
| Omer Gull - SELECT code execution from using SQlite - DEF CON 27 Conference | HRbwkpnV1Rw | 40:55 | 222M |
| Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits - DEF CON 27 Conference | gIJOtP1AC3A | 42:13 | 392M |
| Orange Tsai - Infiltrating Corporate Intranet Like NSA Preauth RCE - DEF CON 27 Conference | 1IoythC_pIY | 45:58 | 490M |
| Panel - DEF CON to help hackers anonymously submit bugs to the government - DEF CON 27 Conference | bfHVm7MGSYU | 46:11 | 665M |
| Panel - Hacking Congress The Enemy Of My Enemy Is My Friend - DEF CON 27 Conference | tfRFV7NSeSI | 40:48 | 549M |
| Panel - IoT Security and Manufacturers Q and A Panel - DEF CON 27 IoT Village | zl83bZEumC0 | 50:17 | 189M |
| Patrick Wardle - Harnessing Weapons of Mac Destruction - DEF CON 27 Conference | InL3YA_6P6s | 48:50 | 786M |
| Pedro Cabrera Camara - SDR Against Smart TVs URL Channel Injection Attacks - DEF CON 27 Conference | pmYM5sBtIGs | 42:56 | 230M |
| Perry Carpenter - The Aspies Guide to Social Engineering - DEF CON 27 Social Engineering Village | 5IraysvK38A | 31:49 | 295M |
| phar - No Mas How Side Channel Flaw Opens ATM Pharmacies and Gov to Attack - DEF CON 27 Conference | viU8Qs1Sccg | 36:56 | 261M |
| Philippe Laulheret - Intro to Hardware Hacking - DEF CON 27 Conference | HuCbr2588-w | 46:07 | 334M |
| R Paul Wilson - R Paul Wilson - DEF CON 27 Social Engineering Village | 9awwtHVLbfI | 32:05 | 312M |
| Rebecca Long - Hacking Your Career Thru Social Engineering - DEF CON 27 Social Engineering Village | D0w-R7Q9a0Y | 27:54 | 216M |
| Riana Pfefferkorn - Compelled Device Decryption and 5A - DEF CON 27 Crypto and Privacy Village | 1NF99lSdKCE | 28:24 | 149M |
| Richard Gold - Asset Discovery Making Sense of the Ocean of OSINT - DEF CON 27 Recon Village | Srbl8AvN5Wo | 39:05 | 275M |
| Rick Ramgattie - SOHOpelessly Broken 2 point 0 - DEF CON 27 IoT Village | jEX9YMbzFXs | 44:05 | 349M |
| Robert Sell - Hack the Planet Hackers Influencing Positive Change - DEF CON 27 Recon Village | RWh4RH5XkkE | 29:24 | 195M |
| Robin Dreeke - Sizing People Up - DEF CON 27 Social Engineering Village | H3XR4QrJyxA | 53:47 | 345M |
| Robin Dreeke - The SEPodcast Ep 120 Live Guest Robin Dreeke - DEF CON 27 Social Engineering Village | BhoSQyVTsa4 | 01:13:43 | 787M |
| Roger Dingledine - The Tor Censorship Arms Race The Next Chapter - DEF CON 27 Conference | ZB8ODpw_om8 | 41:52 | 722M |
| Russell Butturini - Phishing Freakonomics - DEF CON 27 Packet Hacking Village | 6NuaZjO-VVs | 54:22 | 314M |
| Ryan MacDougall - OSINT in the Real World - DEF CON 27 Social Engineering Village | DSEGmdzs9Kg | 29:20 | 162M |
| s0lst1c3 - War Never Changes Attacks Against WPA3s Enhanced Open - DEF CON 27 Wireless Village | xo_iUfbCyN4 | 40:50 | 299M |
| Sam Erb - Hunting Certificates and Servers - DEF CON 27 Packet Hacking Village | 1pqCqz3JzXE | 16:50 | 65M |
| Sarah McCarthy - Quantum Safe Instantaneous Vehicle Comms - DEF CON 27 Crypto and Privacy Village | eblBo40VlRs | 15:08 | 105M |
| Save the Date - DEF CON's first New Year's Eve party! | dUsm26MlA7M | 00:30 | 2M |
| Senator Ron Wyden - Can You Track Me Now - DEF CON 27 Conference | LylMvKFdwJU | 38:34 | 684M |
| Seyfullah KILIÇ - OSINT Approach in Big Data - DEF CON 27 Recon Village | bI5jTobouW4 | 24:45 | 163M |
| Shane McCombs - Why vigilantism doesnt work - DEF CON 27 Social Engineering Village | XWZZDCnCRXs | 30:14 | 171M |
| Sheila Ayelen Berta - Backdooring Hardware by Injecting Malicious Payloads - DEF CON 27 Conference | 2Tik3ut9Wa0 | 37:43 | 234M |
| smea - Adventures In Smart Buttplug Penetration testing - DEF CON 27 Conference | RnxcPeemHSc | 45:34 | 196M |
| Spreading Malware with Google Nice Quilombo - Fabian Cuchietti Gonzalo Sanchez - DEF CON China Beta | zrz68asfckk | 23:30 | 409M |
| Stephan Gerling - Yacht Hacking from SatCOM to engine control - DEF CON 27 Hack the Sea Village | vt2t75RoCDY | 58:12 | 475M |
| Stephan Huber - Im on Your Phone Listening Attacking VoIP Config Interfaces - DEF CON 27 Conference | 4Ing58vWkx0 | 43:03 | 154M |
| Steve Thomas - Easy PAKE Oven - DEF CON 27 Crypto and Privacy Village | 28SM5ILpHEE | 43:39 | 183M |
| Suchismita Pahi - How to Integrate Privacy Legal Security - DEF CON 27 Crypto and Privacy Village | NSuII5D76kI | 45:07 | 259M |
| Susan - Social Media The New Court of Public opinion - DEF CON 27 Recon Village | zCHHAnPK3DE | 20:38 | 159M |
| Ted - Are you inteRESTed in Kismet? - DEF CON 27 Wireless Village | _XlIKCMy3AM | 18:09 | 116M |
| The Dark Tangent - Closing Ceremonies - DEF CON 27 Conference | _pbGZg46hBk | 01:53:07 | 1G |
| The Ricks - WCTF Gear Talk - DEF CON 27 Wireless Village | 3eSo5v35rpw | 02:10:47 | 786M |
| Tiffany Li - Facial Recognition DNA and Biometric Privacy - DEF CON 27 Crypto and Privacy Village | bxbazQ6wJlU | 26:50 | 110M |
| Title: DEF CON 32 - DEF CON Unplugged: Cocktails & Cyber with Jeff & Jen - Jen Easterly, Jeff Moss | QCoRhK7u9qw | 48:13 | 1G |
| Tom Kopchak - Lessons Learned Running a Pentesting Competition - DEF CON 27 Packet Hacking Village | W_tX2dhXm5s | 56:43 | 221M |
| Travis Palmer - First Try DNS Cache Poisoning with IPv4 and IPv6 - DEF CON 27 Packet Hacking Village | jM4wKCGvbp0 | 48:13 | 194M |
| Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot - DEF CON 27 Conference | cFkaobkRyyI | 18:27 | 142M |
| Tyler Kell - Towards Usable Dining Crypto Networks w Howl - DEF CON 27 Crypto and Privacy Village | Or-RN4MoE3U | 19:18 | 72M |
| Utku Sen - Generating Personalized Wordlists by Analyzing Targets Tweets - DEF CON 27 Recon Village | R3XuI9JUFDA | 19:35 | 68M |
| Utku Sen - Personalized Wordlists With NLP by Analyzing Tweets - DEF CON 27 Packet Hacking Village | 4AtmC7P0vzc | 24:44 | 89M |
| Vitor Ventura - Snoop all Telegram messages - DEF CON 27 Crypto and Privacy Village | 8BmZBnS30As | 26:01 | 100M |
| Wayne Ronaldson - RED TEAMING FROM DOWN UNDER - DEF CON 27 Social Engineering Village | IJ0MuyzaaaY | 33:58 | 240M |
| Wenxiang Qian - Breaking Google Home Exploit It with SQLite - DEF CON 27 Conference | YBwT7PU6QU4 | 38:36 | 159M |
| Wicked Clown - Finding the needle in the Twitter haystack - DEF CON 27 Recon Village | 9FnE3Y9YMJs | 12:49 | 73M |
| WillC - Phreaking Elevators - DEF CON 27 Conference | NoZ7ujJhb3k | 40:00 | 666M |
| William Suthers - PIE HW based Prebellico Intel Exfiltration Botnet - DEF CON 27 Recon Village | yDvcBeP5ekI | 48:39 | 412M |
| Winnona DeSombre - Bestsellers in the Underground Economy - DEF CON 27 Packet Hacking Village | ajMwvsJTz58 | 25:04 | 126M |
| Woody - The Ford Hack Raptor Captor video - DEF CON 27 Wireless Village | 9gfg8gk3lVw | 58:35 | 229M |
| xBen Benmap Morris - Finding Secrets in Publicly Exposed Ebs Volumes - DEF CON 27 Conference | HXM1rBk_wXs | 44:49 | 433M |
| Xiangqian Zhang - Bugfinding & Exploit Techniques Android File Transfer Apps - DEF CON 27 Conference | 9gkconldTAU | 34:14 | 308M |
| XiaoHuiHui - All the 4G Modules Could Be Hacked - DEF CON 27 Conference | OORUkEsannA | 47:22 | 341M |
| Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space - DEF CON 27 Conference | DJFxhShJ6Ns | 38:57 | 328M |
| Xiling Gong - Exploiting Qualcomm WLAN and Modem Over the Air - DEF CON 27 Conference | KxdfX9NxfA4 | 32:26 | 193M |
| You logged into my account - Daizibukaikou - DEF CON China Beta | mmrvFoF1wh4 | 45:04 | 153M |
| YouTube Housekeeping Alert | 2b8AWLTq67w | 00:40 | 9M |