DEF CON 30-33 演講清單
推薦指數說明: (與Claude AI討論過後)
- ⭐⭐⭐⭐⭐ 強烈推薦 - 高度相關我的興趣
- ⭐⭐⭐⭐ 推薦 - 很有價值
- ⭐⭐⭐ 值得一看 - 有趣但不是核心領域
除了這邊與我興趣相關的300多個影片,其他還有將近50幾個影片,可以到官網直接查看喔!
media.defcon.org
All DEF CON video presentations, music, documentaries, pictures, villages, and Capture The Flag data that can be found.

| 年份 | 演講標題 | 推薦 | 領域 |
| DEF CON 33 (2025) | Claude - Climbing a CTF Scoreboard Near You | ⭐⭐⭐⭐⭐ | CTF/AI |
| DEF CON 33 (2025) | Ghosts in the Machine Check - Hardware Failures for Privilege Escalation - Christopher Domas | ⭐⭐⭐⭐⭐ | 硬體安全/漏洞利用 |
| DEF CON 33 (2025) | Emulating Embedded Linux Devices at Scale with Light-Touch Firmware Rehosting | ⭐⭐⭐⭐⭐ | IoT/韌體分析 |
| DEF CON 33 (2025) | Hacking Hotspots - Pre-Auth RCE on 5G/4G Routers | ⭐⭐⭐⭐⭐ | IoT/路由器安全 |
| DEF CON 33 (2025) | DisguiseDelimit - Exploiting Synology NAS | ⭐⭐⭐⭐⭐ | IoT/NAS漏洞 |
| DEF CON 33 (2025) | De-Virtualizing the Dragon - Automated Unpacking and Deobfuscation | ⭐⭐⭐⭐⭐ | 逆向工程/自動化 |
| DEF CON 33 (2025) | 7 Vulns in 7 Days - Breaking Bloatware Faster | ⭐⭐⭐⭐⭐ | 漏洞研究方法論 |
| DEF CON 33 (2025) | Gateways to Chaos - Modems Are a Ticking Time Bomb | ⭐⭐⭐⭐⭐ | IoT/數據機安全 |
| DEF CON 33 (2025) | Exploiting Vulnerabilities in the EV Charging Communication | ⭐⭐⭐⭐⭐ | IoT/EV安全 |
| DEF CON 33 (2025) | From Spoofing to Tunneling - New Red Team Networking Techniques | ⭐⭐⭐⭐⭐ | 紅隊/網路攻擊 |
| DEF CON 33 (2025) | Jailbreaking the Hivemind - eBPF Kernel Vulnerabilities | ⭐⭐⭐⭐⭐ | Linux Kernel/漏洞利用 |
| DEF CON 32 (2024) | The XZ Backdoor Story - Undercover Operation | ⭐⭐⭐⭐⭐ | 供應鏈/後門 |
| DEF CON 32 (2024) | Unsaflok - Hacking millions of hotel locks | ⭐⭐⭐⭐⭐ | 實體安全/IoT |
| DEF CON 32 (2024) | AMD Sinkclose - Universal Ring-2 Privilege Escalation | ⭐⭐⭐⭐⭐ | 硬體/CPU漏洞 |
| DEF CON 32 (2024) | Hacking Millions of Modems - Sam Curry | ⭐⭐⭐⭐⭐ | IoT/大規模漏洞 |
| DEF CON 32 (2024) | ACE up the Sleeve - iPhone 15 JTAG to USB-C Controller | ⭐⭐⭐⭐⭐ | 硬體/Apple |
| DEF CON 32 (2024) | Iconv, set the charset to RCE - PHP engine exploit | ⭐⭐⭐⭐⭐ | Web/PHP漏洞 |
| DEF CON 32 (2024) | SQL Injection Isn't Dead - Protocol Level Smuggling | ⭐⭐⭐⭐⭐ | Web/SQL注入 |
| DEF CON 32 (2024) | 0.0.0.0 Day - Exploiting Localhost APIs From Browser | ⭐⭐⭐⭐⭐ | 瀏覽器/SSRF |
| DEF CON 32 (2024) | Mobile Mesh RF Network Exploitation - goTenna | ⭐⭐⭐⭐⭐ | 無線/Mesh網路 |
| DEF CON 32 (2024) | Compromising Electronic Logging Device - Truck2Truck Worm | ⭐⭐⭐⭐⭐ | IoT/蠕蟲 |
| DEF CON 32 (2024) | Reverse Engineering MicroPython Frozen Modules | ⭐⭐⭐⭐⭐ | 逆向/Python |
| DEF CON 32 (2024) | HookChain - New perspective for Bypassing EDR | ⭐⭐⭐⭐⭐ | 紅隊/EDR繞過 |
| DEF CON 32 (2024) | Sshamble - Unexpected Exposures in SSH | ⭐⭐⭐⭐⭐ | SSH/協議漏洞 |
| DEF CON 31 (2023) | Breaking BMC - The Forgotten Key to the Kingdom | ⭐⭐⭐⭐⭐ | 硬體/BMC |
| DEF CON 31 (2023) | A Pain in the NAS - Exploiting Cloud Connectivity | ⭐⭐⭐⭐⭐ | NAS/雲端 |
| DEF CON 31 (2023) | Exploiting OPC-UA in Every Possible Way | ⭐⭐⭐⭐⭐ | 工控/OPC-UA |
| DEF CON 31 (2023) | Getting a Migraine - SIP bypass on macOS | ⭐⭐⭐⭐⭐ | macOS/繞過 |
| DEF CON 31 (2023) | Smashing the state machine - web race conditions | ⭐⭐⭐⭐⭐ | Web/競爭條件 |
| DEF CON 31 (2023) | Contactless Overflow - Payment terminals over NFC | ⭐⭐⭐⭐⭐ | 支付/NFC |
| DEF CON 31 (2023) | Cellular Carriers Hate This Trick - SIM tunneling | ⭐⭐⭐⭐⭐ | 電信/SIM |
| DEF CON 31 (2023) | Advanced ROP Framework - Pushing ROP to Its Limits | ⭐⭐⭐⭐⭐ | 漏洞利用/ROP |
| DEF CON 31 (2023) | Backdoor in the Core - Altering Intel x86 at Runtime | ⭐⭐⭐⭐⭐ | CPU/Intel |
| DEF CON 31 (2023) | Over the Air, Under the Radar - Pixel Modem | ⭐⭐⭐⭐⭐ | 手機/Baseband |
| DEF CON 30 (2022) | Black Box Security Evaluation of SpaceX Starlink | ⭐⭐⭐⭐⭐ | 衛星/太空 |
| DEF CON 30 (2022) | ElectroVolt - Pwning Desktop Apps on Electron | ⭐⭐⭐⭐⭐ | Electron/桌面應用 |
| DEF CON 30 (2022) | Browser-Powered Desync Attacks - HTTP Request Smuggling | ⭐⭐⭐⭐⭐ | Web/HTTP走私 |
| DEF CON 30 (2022) | The hitchhacker's guide to iPhone Lightning and JTAG | ⭐⭐⭐⭐⭐ | iPhone/硬體 |
| DEF CON 30 (2022) | Trailer Shouting - Talking PLC4TRUCKS with SDR | ⭐⭐⭐⭐⭐ | 車輛/SDR |
| DEF CON 30 (2022) | Hacking the Farm - Agricultural Devices | ⭐⭐⭐⭐⭐ | 農業/IoT |
| DEF CON 30 (2022) | Emoji Shellcoding | ⭐⭐⭐⭐⭐ | 漏洞利用/創意 |
| DEF CON 30 (2022) | Process Injection - Breaking MacOS Security Layers | ⭐⭐⭐⭐⭐ | macOS/注入 |
| DEF CON 30 (2022) | The PACMAN Attack - Breaking PAC on Apple M1 | ⭐⭐⭐⭐⭐ | Apple M1/硬體 |
| DEF CON 30 (2022) | One Bootloader to Load Them All | ⭐⭐⭐⭐⭐ | Bootloader/安全啟動 |
| DEF CON 33 (2025) | Ghost Calls - Abusing Web Conferencing for C2 | ⭐⭐⭐⭐ | 紅隊/C2技術 |
| DEF CON 33 (2025) | Ghosts of REvil - Inside Kaseya Ransomware Attack | ⭐⭐⭐⭐ | 勒索軟體/案例分析 |
| DEF CON 33 (2025) | HTTP/1.1 Must Die - The Desync Endgame | ⭐⭐⭐⭐ | Web安全/HTTP |
| DEF CON 33 (2025) | Kill List - Hacking an Assassination Site on Dark Web | ⭐⭐⭐⭐ | 暗網/調查 |
| DEF CON 33 (2025) | macOS PRT Cookie Theft & Entra ID Persistence | ⭐⭐⭐⭐ | macOS/雲端安全 |
| DEF CON 33 (2025) | Loading Models, Launching Shells - Abusing AI File Formats | ⭐⭐⭐⭐ | AI安全/RCE |
| DEF CON 33 (2025) | Metal-as-a-Disservice - Exploiting Legacy Flaws in Cutting-Edge Clouds | ⭐⭐⭐⭐ | 雲端安全 |
| DEF CON 33 (2025) | Advanced Active Directory to Entra ID lateral movement | ⭐⭐⭐⭐ | AD/橫向移動 |
| DEF CON 33 (2025) | BitUnlocker - Leveraging Windows Recovery to Extract BitLocker Secrets | ⭐⭐⭐⭐ | Windows安全/加密 |
| DEF CON 33 (2025) | Breakin 'Em All - Overcoming Pokemon Go's Anti-Cheat | ⭐⭐⭐⭐ | 遊戲安全/逆向 |
| DEF CON 33 (2025) | Breaking Wi-Fi Easy Connect - Security Analysis of DPP | ⭐⭐⭐⭐ | 無線安全/Wi-Fi |
| DEF CON 33 (2025) | Can't Stop the ROP - Automating Universal ASLR Bypasses | ⭐⭐⭐⭐ | 漏洞利用/ROP |
| DEF CON 33 (2025) | ChromeAlone - Transforming a Browser into a C2 Platform | ⭐⭐⭐⭐ | 紅隊/瀏覽器 |
| DEF CON 33 (2025) | Escaping the Privacy Sandbox with Client-Side Deanonymization | ⭐⭐⭐⭐ | 瀏覽器安全/隱私 |
| DEF CON 33 (2025) | Firewall flameout - China's 5+ year campaign | ⭐⭐⭐⭐ | 網路設備安全 |
| DEF CON 33 (2025) | Help Linux in my Webcam | ⭐⭐⭐⭐ | 硬體/嵌入式 |
| DEF CON 33 (2025) | Infecting the Boot to Own the Kernel - Bootkits | ⭐⭐⭐⭐ | Bootkit/Rootkit |
| DEF CON 33 (2025) | Invitation Is All You Need - Invoking Gemini Agents | ⭐⭐⭐⭐ | AI安全/Google |
| DEF CON 33 (2025) | Kill Chain Reloaded - Abusing legacy paths for persistence | ⭐⭐⭐⭐ | 紅隊/持久化 |
| DEF CON 33 (2025) | Man-in-the-Malware - Intercepting Adversarial Communications | ⭐⭐⭐⭐ | 惡意軟體分析 |
| DEF CON 33 (2025) | No VPN Needed - Cryptographic Attacks Against OPC UA Protocol | ⭐⭐⭐⭐ | 工控安全/密碼學 |
| DEF CON 33 (2025) | One Key, Two Key, I Just Stole Your goTenna Key | ⭐⭐⭐⭐ | 無線通訊/加密 |
| DEF CON 33 (2025) | Passkeys Pwned - Turning WebAuthn Against Itself | ⭐⭐⭐⭐ | Web認證/安全 |
| DEF CON 33 (2025) | Rebadged, Relabeled, and Rooted - Solar Supply Chain | ⭐⭐⭐⭐ | 供應鏈/太陽能 |
| DEF CON 33 (2025) | Recording PCAPs from Stingrays With a $20 Hotspot | ⭐⭐⭐⭐ | 無線/監控 |
| DEF CON 33 (2025) | ReVault Compromised by your Secure SoC | ⭐⭐⭐⭐ | 硬體安全 |
| DEF CON 33 (2025) | SCCM - The tree that always bears bad fruits | ⭐⭐⭐⭐ | Windows/企業安全 |
| DEF CON 33 (2025) | SSH-nanigans - Busting Open the Mainframes Iron Fortress | ⭐⭐⭐⭐ | SSH/大型主機 |
| DEF CON 33 (2025) | Turning Camera Surveillance on its Axis | ⭐⭐⭐⭐ | IoT/監控攝影機 |
| DEF CON 33 (2025) | Virtualization-Based (In)security - Weaponizing VBS Enclaves | ⭐⭐⭐⭐ | Windows/虛擬化 |
| DEF CON 33 (2025) | Win-DoS Epidemic - Abusing RPC for Win-DoS & Win-DDoS | ⭐⭐⭐⭐ | Windows/DoS |
| DEF CON 33 (2025) | Zero Trust, Total Bust - Breaking cloud VPNs with one bug | ⭐⭐⭐⭐ | 雲端/VPN安全 |
| DEF CON 32 (2024) | Clash, Burn, and Exploit - kernelCTF | ⭐⭐⭐⭐ | Kernel/CTF |
| DEF CON 32 (2024) | Dragon Slaying Guide - Bug Hunting In VMware | ⭐⭐⭐⭐ | 虛擬化/VMware |
| DEF CON 32 (2024) | Exploiting Bluetooth - from car to bank account | ⭐⭐⭐⭐ | 藍牙/IoT |
| DEF CON 32 (2024) | Grand Theft Actions - Abusing Self-Hosted GitHub Runners | ⭐⭐⭐⭐ | CI/CD/供應鏈 |
| DEF CON 32 (2024) | Behind Enemy Lines - Going undercover into LockBit | ⭐⭐⭐⭐ | 勒索軟體/臥底 |
| DEF CON 32 (2024) | Joe and Bruno's Guide to Hacking Time - RoboForm | ⭐⭐⭐⭐ | 密碼學/時間攻擊 |
| DEF CON 32 (2024) | Windows Downdate - Downgrade Attacks Using Windows Updates | ⭐⭐⭐⭐ | Windows/降級攻擊 |
| DEF CON 32 (2024) | Kicking in the Door to the Cloud - Cloud Provider Vulns | ⭐⭐⭐⭐ | 雲端安全 |
| DEF CON 32 (2024) | Automobiles, alcohol, blood, sweat - Car Modding tool reversing | ⭐⭐⭐⭐ | 汽車/逆向 |
| DEF CON 32 (2024) | Breaking the Beam - Exploiting VSAT Satellite Modems | ⭐⭐⭐⭐ | 衛星/無線 |
| DEF CON 32 (2024) | Defeating EDR - Memory Forensics | ⭐⭐⭐⭐ | 取證/EDR |
| DEF CON 32 (2024) | Optical Espionage - Lasers to Hear Keystrokes | ⭐⭐⭐⭐ | 實體攻擊/監聽 |
| DEF CON 32 (2024) | QuickShell - RCE on Quick Share | ⭐⭐⭐⭐ | Android/檔案傳輸 |
| DEF CON 32 (2024) | Secrets and Shadows - Big Data for Vulnerability Discovery | ⭐⭐⭐⭐ | 漏洞研究/大數據 |
| DEF CON 32 (2024) | The Way To Android Root - Exploiting GPU on Smartphone | ⭐⭐⭐⭐ | Android/GPU漏洞 |
| DEF CON 32 (2024) | Xiaomi The Money - Pwn2Own Exploit Story | ⭐⭐⭐⭐ | 手機/Pwn2Own |
| DEF CON 32 (2024) | AWS CloudQuarry - Secrets in public AMIs | ⭐⭐⭐⭐ | 雲端/AWS |
| DEF CON 32 (2024) | Behind Enemy Lines - Engaging Ransomware Web Panels | ⭐⭐⭐⭐ | 勒索軟體/Web |
| DEF CON 32 (2024) | BOLABuster - LLMs for Automating BOLA Detection | ⭐⭐⭐⭐ | API安全/AI |
| DEF CON 32 (2024) | Breaching AWS Through Shadow Resources | ⭐⭐⭐⭐ | AWS/雲端 |
| DEF CON 32 (2024) | Creating Process Injection with ROP | ⭐⭐⭐⭐ | 漏洞利用/ROP |
| DEF CON 32 (2024) | Defeating magic by magic - ALPC to compromise RPC | ⭐⭐⭐⭐ | Windows/RPC |
| DEF CON 32 (2024) | Discovering exploits against 1Password MacOS | ⭐⭐⭐⭐ | macOS/密碼管理 |
| DEF CON 32 (2024) | DriverJack - NTFS as Infection Vector | ⭐⭐⭐⭐ | Windows/持久化 |
| DEF CON 32 (2024) | Exploiting the Unexploitable - Kibana Bug Bounty | ⭐⭐⭐⭐ | Web/Elasticsearch |
| DEF CON 32 (2024) | Gotta Cache 'em all - web cache exploitation | ⭐⭐⭐⭐ | Web/快取投毒 |
| DEF CON 32 (2024) | Gridlock - EV and Solar APIs in Grid Security | ⭐⭐⭐⭐ | IoT/能源 |
| DEF CON 32 (2024) | Hacking Corporate Banking for Fun and Profit | ⭐⭐⭐⭐ | 金融/Web |
| DEF CON 32 (2024) | High Intensity Deconstruction - Cryptographic Heist | ⭐⭐⭐⭐ | 密碼學/攻擊 |
| DEF CON 32 (2024) | Incubated ML Exploits - Backdooring ML Pipelines | ⭐⭐⭐⭐ | AI/ML安全 |
| DEF CON 32 (2024) | Inside FBI's Secret Phone Company 'Anom' | ⭐⭐⭐⭐ | 執法/加密 |
| DEF CON 32 (2024) | Mutual authentication is optional | ⭐⭐⭐⭐ | TLS/認證 |
| DEF CON 32 (2024) | Nano-Enigma - Secrets Within eFuse Memories | ⭐⭐⭐⭐ | 硬體/記憶體 |
| DEF CON 32 (2024) | No Symbols When Reversing - Bring Your Own | ⭐⭐⭐⭐ | 逆向工程 |
| DEF CON 32 (2024) | NTLM - The Last Ride | ⭐⭐⭐⭐ | Windows/認證 |
| DEF CON 32 (2024) | Obfuscation and De-Obfuscation | ⭐⭐⭐⭐ | 惡意軟體分析 |
| DEF CON 32 (2024) | OH-MY-DC - Abusing OIDC to your cloud | ⭐⭐⭐⭐ | 雲端/OIDC |
| DEF CON 32 (2024) | One for All - WHAD wireless shenanigans | ⭐⭐⭐⭐ | 無線/SDR |
| DEF CON 32 (2024) | Open Sesame - vulnerable electronic lockers | ⭐⭐⭐⭐ | IoT/實體安全 |
| DEF CON 32 (2024) | Outlook Unleashing RCE Chaos - CVE-2024-30103 | ⭐⭐⭐⭐ | Windows/Email |
| DEF CON 32 (2024) | Redefining V2G - vehicle as a game controller | ⭐⭐⭐⭐ | 汽車/V2G |
| DEF CON 32 (2024) | Relative Path File Injection - Next Evolution in RPO | ⭐⭐⭐⭐ | Web/路徑注入 |
| DEF CON 32 (2024) | SDLC Nightmares - GPT Hallucinations in Code Review | ⭐⭐⭐⭐ | AI/SDLC |
| DEF CON 32 (2024) | Securing Frontends at Scale - Post-XSS World | ⭐⭐⭐⭐ | Web/前端安全 |
| DEF CON 32 (2024) | SHIM me what you got - Shim and Office Code Injection | ⭐⭐⭐⭐ | Windows/注入 |
| DEF CON 32 (2024) | Smishing Smackdown - USPS Smishing | ⭐⭐⭐⭐ | 釣魚/SMS |
| DEF CON 32 (2024) | Speed Bumps and Speed Hacks - Car Manufacturers Security | ⭐⭐⭐⭐ | 汽車安全 |
| DEF CON 32 (2024) | Splitting the email atom - exploiting parsers | ⭐⭐⭐⭐ | Email/解析器 |
| DEF CON 32 (2024) | Sudos and Sudon'ts - Sudo for Windows | ⭐⭐⭐⭐ | Windows/權限 |
| DEF CON 32 (2024) | Taming the Beast - Llama 3 Red Team | ⭐⭐⭐⭐ | AI/紅隊 |
| DEF CON 32 (2024) | The hack, the crash and two smoking barrels | ⭐⭐⭐⭐ | 駭客故事 |
| DEF CON 32 (2024) | The not-so-silent type - Chinese keyboard apps crypto | ⭐⭐⭐⭐ | 密碼學/隱私 |
| DEF CON 32 (2024) | The Secret Life of a Rogue Device | ⭐⭐⭐⭐ | 供應鏈/二手設備 |
| DEF CON 32 (2024) | Ticking SQLi | ⭐⭐⭐⭐ | Web/SQL注入 |
| DEF CON 32 (2024) | Troll Trapping Through TAS Tools - Speedrunning Cheaters | ⭐⭐⭐⭐ | 遊戲/反作弊 |
| DEF CON 32 (2024) | Unlocking the Gates - Industrial Remote Access | ⭐⭐⭐⭐ | 工控/遠端存取 |
| DEF CON 32 (2024) | Unlocking the Gates - Authentication Bypass Vulns | ⭐⭐⭐⭐ | Web/認證繞過 |
| DEF CON 32 (2024) | Watchers being watched - Surveillance System supply chain | ⭐⭐⭐⭐ | IoT/監控 |
| DEF CON 32 (2024) | When Chatbots Go Rogue - LLM Applications | ⭐⭐⭐⭐ | AI/LLM安全 |
| DEF CON 32 (2024) | Your AI Assistant has a Big Mouth - Side-Channel | ⭐⭐⭐⭐ | AI/側信道 |
| DEF CON 32 (2024) | Your CI-CD Pipeline Is Vulnerable | ⭐⭐⭐⭐ | DevOps/CI/CD |
| DEF CON 31 (2023) | Retro Exploitation - Vintage Computing as Research Playground | ⭐⭐⭐⭐ | 復古/研究方法 |
| DEF CON 31 (2023) | Vacuum Robot Security - Prevent robot from sucking data | ⭐⭐⭐⭐ | IoT/掃地機器人 |
| DEF CON 31 (2023) | Video-based Cryptanalysis - Extracting Keys from Power LEDs | ⭐⭐⭐⭐ | 側信道/視覺 |
| DEF CON 31 (2023) | Unlocking hidden powers in Xtensa Qualcomm Wifi chips | ⭐⭐⭐⭐ | Wi-Fi/晶片 |
| DEF CON 31 (2023) | Nothing but Net - Detecting macOS Malware | ⭐⭐⭐⭐ | macOS/偵測 |
| DEF CON 31 (2023) | NoFilter - Abusing Windows Filtering Platform | ⭐⭐⭐⭐ | Windows/權限提升 |
| DEF CON 31 (2023) | A Comprehensive Review - 9 Years of MikroTik Pre-Auth RCE | ⭐⭐⭐⭐ | 路由器/MikroTik |
| DEF CON 31 (2023) | A SSLippery Slope - Certificate Misuse | ⭐⭐⭐⭐ | TLS/憑證 |
| DEF CON 31 (2023) | Apple's Predicament - NSPredicate on macOS and iOS | ⭐⭐⭐⭐ | Apple/漏洞利用 |
| DEF CON 31 (2023) | Azure B2C 0-Day - Public Keys to Microsoft Bug Bounty | ⭐⭐⭐⭐ | Azure/雲端 |
| DEF CON 31 (2023) | Badge of Shame - Breaking into Facilities with OSDP | ⭐⭐⭐⭐ | 實體安全/門禁 |
| DEF CON 31 (2023) | Calling it a 0-Day - Hacking PBX-UC Systems | ⭐⭐⭐⭐ | VoIP/PBX |
| DEF CON 31 (2023) | certmitm - Automatic TLS certificate validation exploits | ⭐⭐⭐⭐ | TLS/中間人 |
| DEF CON 31 (2023) | CON Trolling the Weather | ⭐⭐⭐⭐ | IoT/氣象 |
| DEF CON 31 (2023) | Contain Yourself - Windows Container Isolation | ⭐⭐⭐⭐ | Windows/容器 |
| DEF CON 31 (2023) | Defender-Pretender - Windows Defender Updates Security Risk | ⭐⭐⭐⭐ | Windows/Defender |
| DEF CON 31 (2023) | Defeating VPN Always-On | ⭐⭐⭐⭐ | VPN/繞過 |
| DEF CON 31 (2023) | Demystifying macOS's Background Task Management | ⭐⭐⭐⭐ | macOS/持久化 |
| DEF CON 31 (2023) | ELECTRONizing macOS privacy | ⭐⭐⭐⭐ | macOS/Electron |
| DEF CON 31 (2023) | Exploring Linux Memory Manipulation | ⭐⭐⭐⭐ | Linux/記憶體 |
| DEF CON 31 (2023) | From Feature to Weapon - MS Teams and SharePoint | ⭐⭐⭐⭐ | Microsoft/雲端 |
| DEF CON 31 (2023) | Game-Changing Advances in Windows Shellcode Analysis | ⭐⭐⭐⭐ | Windows/Shellcode |
| DEF CON 31 (2023) | GhostToken - Exploiting Google Cloud Platform | ⭐⭐⭐⭐ | GCP/雲端 |
| DEF CON 31 (2023) | I Watched You Roll the Die - RDP Monitoring | ⭐⭐⭐⭐ | Windows/RDP |
| DEF CON 31 (2023) | Malware design - Abusing legacy Microsoft transports | ⭐⭐⭐⭐ | Windows/惡意軟體 |
| DEF CON 31 (2023) | mTLS - When Certificate Authentication Is Done Wrong | ⭐⭐⭐⭐ | TLS/mTLS |
| DEF CON 31 (2023) | ndays are also 0days | ⭐⭐⭐⭐ | 漏洞利用/N-day |
| DEF CON 31 (2023) | Physical Attacks Against Smartphones | ⭐⭐⭐⭐ | 手機/實體攻擊 |
| DEF CON 31 (2023) | Polynonce - An ECDSA Attack | ⭐⭐⭐⭐ | 密碼學/ECDSA |
| DEF CON 31 (2023) | Private Keys in Public Places | ⭐⭐⭐⭐ | 密鑰管理 |
| DEF CON 31 (2023) | Revolutionizing ELF binary patching with Shiva | ⭐⭐⭐⭐ | Linux/二進位 |
| DEF CON 31 (2023) | Route to Bugs - BGP message parsing security | ⭐⭐⭐⭐ | 網路/BGP |
| DEF CON 31 (2023) | Runtime Riddles - Manipulation Points in Android | ⭐⭐⭐⭐ | Android/運行時 |
| DEF CON 31 (2023) | Second Breakfast - Serialization Vulnerabilities in .NET | ⭐⭐⭐⭐ | .NET/反序列化 |
| DEF CON 31 (2023) | Silent Spring - Prototype Pollution in Node.js | ⭐⭐⭐⭐ | Node.js/Web |
| DEF CON 31 (2023) | Small Leaks, Billions Of Dollars | ⭐⭐⭐⭐ | 密碼學/側信道 |
| DEF CON 31 (2023) | SpamChannel - Spoofing Emails From 2M Domains | ⭐⭐⭐⭐ | Email/欺騙 |
| DEF CON 31 (2023) | Spooky authentication at a distance | ⭐⭐⭐⭐ | 認證/中繼 |
| DEF CON 31 (2023) | StackMoonwalk | ⭐⭐⭐⭐ | 漏洞利用/Stack |
| DEF CON 31 (2023) | Still Vulnerable Out of the Box | ⭐⭐⭐⭐ | 系統/預設配置 |
| DEF CON 31 (2023) | Terminally Owned - 60 years of escaping | ⭐⭐⭐⭐ | 終端機/逃逸 |
| DEF CON 31 (2023) | Tetra Tour de Force | ⭐⭐⭐⭐ | 無線/TETRA |
| DEF CON 31 (2023) | The Art of Compromising C2 Servers | ⭐⭐⭐⭐ | 紅隊/C2 |
| DEF CON 31 (2023) | The GitHub Actions Worm | ⭐⭐⭐⭐ | CI/CD/供應鏈 |
| DEF CON 31 (2023) | The Price of Convenience - Transportation Payment Systems | ⭐⭐⭐⭐ | 支付/交通 |
| DEF CON 31 (2023) | The RingHopper Journey - Almost Zero-Day'd the World | ⭐⭐⭐⭐ | 漏洞研究 |
| DEF CON 31 (2023) | Track the Planet - Mapping Azure Ecosystem | ⭐⭐⭐⭐ | Azure/OSINT |
| DEF CON 31 (2023) | Turning my virtual wallet into a skimming device | ⭐⭐⭐⭐ | 支付/mPOS |
| DEF CON 31 (2023) | Unlocking Doors from Half a Continent Away | ⭐⭐⭐⭐ | IoT/門鎖 |
| DEF CON 31 (2023) | Visual Studio Code Workspace Trust issues | ⭐⭐⭐⭐ | VSCode/供應鏈 |
| DEF CON 31 (2023) | Warshopping - Smart Shopping Cart Wheels | ⭐⭐⭐⭐ | IoT/RF |
| DEF CON 31 (2023) | Weaponizing Plain Text - ANSI Escape Sequences | ⭐⭐⭐⭐ | 終端機/取證 |
| DEF CON 31 (2023) | You Can't Cheat Time - latency trilateration | ⭐⭐⭐⭐ | 網路/地理定位 |
| DEF CON 31 (2023) | Your Clocks Have Ears - Timing-Based Port Scanner | ⭐⭐⭐⭐ | 瀏覽器/側信道 |
| DEF CON 30 (2022) | All Roads Lead to GKE's Host - 4 Ways to Escape | ⭐⭐⭐⭐ | Kubernetes/容器逃逸 |
| DEF CON 30 (2022) | Avoiding Memory Scanners - Customizing Malware | ⭐⭐⭐⭐ | 惡意軟體/EDR繞過 |
| DEF CON 30 (2022) | Defeating Moving Elements in High Security Keys | ⭐⭐⭐⭐ | 實體安全/鎖 |
| DEF CON 30 (2022) | Emulation-driven Reverse Engineering for Vulns | ⭐⭐⭐⭐ | 逆向/模擬 |
| DEF CON 30 (2022) | Exploring Ancient Ruins - 0-Day in MS-RPC | ⭐⭐⭐⭐ | Windows/RPC |
| DEF CON 30 (2022) | LSASS Shtinkering - Windows Error Reporting to Dump LSASS | ⭐⭐⭐⭐ | Windows/憑證竊取 |
| DEF CON 30 (2022) | The Journey From Container to Cluster Admin in Service Fabric | ⭐⭐⭐⭐ | Azure/容器 |
| DEF CON 30 (2022) | Old Malware, New Tools - Ghidra and Commodore 64 | ⭐⭐⭐⭐ | 復古/Ghidra |
| DEF CON 30 (2022) | Pulling Passwords from Configuration Manager | ⭐⭐⭐⭐ | Microsoft SCCM |
| DEF CON 30 (2022) | Backdooring Pickles - A decade only made things worse | ⭐⭐⭐⭐ | Python/反序列化 |
| DEF CON 30 (2022) | The Call is Coming From Inside The Cluster | ⭐⭐⭐⭐ | Kubernetes/安全 |
| DEF CON 30 (2022) | Black-Box Assessment of Smart Cards | ⭐⭐⭐⭐ | 智慧卡 |
| DEF CON 30 (2022) | Hunting Bugs in The Tropics | ⭐⭐⭐⭐ | Bug Hunting |
| DEF CON 30 (2022) | The CSRF Resurrections - Service Worker, SameSite, Fetch | ⭐⭐⭐⭐ | Web/CSRF |
| DEF CON 30 (2022) | Space Jam - RF Attacks in Outer Space | ⭐⭐⭐⭐ | 太空/衛星 |
| DEF CON 30 (2022) | The COW - Container On Windows Escaped the Silo | ⭐⭐⭐⭐ | Windows/容器 |
| DEF CON 30 (2022) | You Have 1 New Appwntment - Hacking iCalendar | ⭐⭐⭐⭐ | Email/行事曆 |
| DEF CON 30 (2022) | Hacking ISPs with PPPoE | ⭐⭐⭐⭐ | ISP/網路 |
| DEF CON 30 (2022) | Deanonymization of Tor HTTP Hidden Services | ⭐⭐⭐⭐ | Tor/去匿名化 |
| DEF CON 30 (2022) | Do Not Trust the ASA, Trojans | ⭐⭐⭐⭐ | Cisco/網路設備 |
| DEF CON 30 (2022) | Doing the Impossible - Mainframe Buffer Overflows | ⭐⭐⭐⭐ | 大型主機 |
| DEF CON 30 (2022) | Tear Down this Zywall - Zyxel Encrypted Firmware | ⭐⭐⭐⭐ | 韌體/加密 |
| DEF CON 30 (2022) | PreAuth RCE Chains on MDM - KACE SMA | ⭐⭐⭐⭐ | MDM/企業 |
| DEF CON 30 (2022) | Chromebook Breakout - Escaping Jail Using Pico Ducky | ⭐⭐⭐⭐ | Chromebook/USB |
| DEF CON 30 (2022) | Analyzing PIPEDREAM - ICS Attack Toolkit | ⭐⭐⭐⭐ | 工控/惡意軟體 |
| DEF CON 30 (2022) | Automotive Ethernet Fuzzing | ⭐⭐⭐⭐ | 汽車/Fuzzing |
| DEF CON 30 (2022) | Wireless Keystroke Injection via BLE | ⭐⭐⭐⭐ | 藍牙/HID |
| DEF CON 30 (2022) | Hack the Hemisphere | ⭐⭐⭐⭐ | 監控/隱私 |
| DEF CON 30 (2022) | Internet Server Error - IPC Desynch Primitives | ⭐⭐⭐⭐ | Web/解析器 |
| DEF CON 30 (2022) | Taking a Dump In The Cloud | ⭐⭐⭐⭐ | 雲端/資料竊取 |
| DEF CON 30 (2022) | Digital Skeleton Keys | ⭐⭐⭐⭐ | RFID/NFC |
| DEF CON 30 (2022) | Low Code High Risk - Enterprise Donation via Low Code | ⭐⭐⭐⭐ | 低程式碼/Power Platform |
| DEF CON 30 (2022) | No-Code Malware - Windows 11 At Your Service | ⭐⭐⭐⭐ | Windows/無程式碼 |
| DEF CON 30 (2022) | The Big Rick - Rickrolled My High School District | ⭐⭐⭐⭐ | 社會工程 |
| DEF CON 30 (2022) | Phreaking 2.0 - Abusing Microsoft Teams Direct Routing | ⭐⭐⭐⭐ | VoIP/Teams |
| DEF CON 30 (2022) | Less SmartScreen More Caffeine - ClickOnce | ⭐⭐⭐⭐ | Windows/繞過 |
| DEF CON 30 (2022) | Defaults - The Faults - Bypassing Android Permissions | ⭐⭐⭐⭐ | Android/權限 |
| DEF CON 30 (2022) | Hidden Attack Surfaces of OEM IoT Devices | ⭐⭐⭐⭐ | IoT/供應鏈 |
| DEF CON 30 (2022) | Running Rootkits Like A Nation-State Hacker | ⭐⭐⭐⭐ | Rootkit/Windows |
| DEF CON 30 (2022) | Let's Dance in the Cache - MS IIS Hash Table | ⭐⭐⭐⭐ | Web/IIS |
| DEF CON 30 (2022) | You Are Muted - Rooted | ⭐⭐⭐⭐ | macOS/攝影機 |
| DEF CON 30 (2022) | Deja Vu - Stolen Algorithms in Commercial Products | ⭐⭐⭐⭐ | 智財權/逆向 |
| DEF CON 30 (2022) | Weaponizing Windows Syscalls as 32-bit Shellcode | ⭐⭐⭐⭐ | Windows/Shellcode |
| DEF CON 30 (2022) | Trace me if you can - Bypassing Linux Syscall Tracing | ⭐⭐⭐⭐ | Linux/反偵測 |
| DEF CON 30 (2022) | How Russia is trying to Block Tor | ⭐⭐⭐⭐ | Tor/審查 |
| DEF CON 30 (2022) | Darknet Opsec By a Veteran Darknet Vendor | ⭐⭐⭐⭐ | 暗網/OPSEC |
| DEF CON 30 (2022) | Perimeter Breached - Hacking Access Control System | ⭐⭐⭐⭐ | 實體安全/門禁 |
| DEF CON 30 (2022) | Crossing the KASM - a Webapp Pentest Story | ⭐⭐⭐⭐ | Web/滲透測試 |
| DEF CON 30 (2022) | Evil PLC Attacks - Weaponizing PLCs | ⭐⭐⭐⭐ | 工控/PLC |
| DEF CON 30 (2022) | Digging into Xiaomi's TEE to Get to Chinese Money | ⭐⭐⭐⭐ | 手機/TEE |
| DEF CON 30 (2022) | STrace - A DTrace on windows reimplementation | ⭐⭐⭐⭐ | Windows/追蹤 |
| DEF CON 30 (2022) | Solana JIT - fuzzing smart-contract compiler | ⭐⭐⭐⭐ | 區塊鏈/Fuzzing |
| DEF CON 30 (2022) | OopsSec - APTs operations security | ⭐⭐⭐⭐ | 威脅情報/OPSEC |
| DEF CON 30 (2022) | Reversing the Original Xbox Live Protocols | ⭐⭐⭐⭐ | 遊戲/逆向 |
| DEF CON 30 (2022) | Save The Environment Variable - Hijacking Apps | ⭐⭐⭐⭐ | Windows/持久化 |
| DEF CON 30 (2022) | A Dead Man's Full-Yet-Responsible-Disclosure System | ⭐⭐⭐⭐ | 漏洞揭露/倫理 |
| DEF CON 30 (2022) | How To Get MUMPS Thirty Years Later | ⭐⭐⭐⭐ | 程式語言/醫療 |
| DEF CON 33 (2025) | 40 Years Of Phrack - Hacking, Zines & Digital Dissent | ⭐⭐⭐ | 駭客文化/歷史 |
| DEF CON 33 (2025) | AppleStorm - Unmasking Privacy Risks of Apple Intelligence | ⭐⭐⭐ | Apple/AI隱私 |
| DEF CON 33 (2025) | Binary Facades - Reversing macOS malware | ⭐⭐⭐ | macOS/惡意軟體 |
| DEF CON 33 (2025) | Browser Extension Clickjacking | ⭐⭐⭐ | 瀏覽器/擴充套件 |
| DEF CON 33 (2025) | Building a Malware Museum | ⭐⭐⭐ | 惡意軟體/歷史 |
| DEF CON 33 (2025) | Carding, Sabotage & Survival - Darknet Market Story | ⭐⭐⭐ | 暗網/社會工程 |
| DEF CON 33 (2025) | Cash, Drugs, and Guns - Why Your Safes Aren't Safe | ⭐⭐⭐ | 實體安全 |
| DEF CON 33 (2025) | CTRAPS - CTAP Impersonation on FIDO2 | ⭐⭐⭐ | 認證/FIDO2 |
| DEF CON 33 (2025) | Cyber Volunteering and Community Defense | ⭐⭐⭐ | 社群/防禦 |
| DEF CON 33 (2025) | Dead Made Alive Again - LaunchAnyWhere Privilege Escalation | ⭐⭐⭐ | Android/權限提升 |
| DEF CON 33 (2025) | Diamonds Are For Hackers - Open source Quantum Sensor | ⭐⭐⭐ | 量子/硬體 |
| DEF CON 33 (2025) | Direct Memory, Access Everywhere | ⭐⭐⭐ | 硬體/DMA |
| DEF CON 33 (2025) | Edge of Tomorrow - Foiling Supply Chain Attacks | ⭐⭐⭐ | 供應鏈安全 |
| DEF CON 33 (2025) | Exploiting Security Side-Channels in E2E Encrypted Messengers | ⭐⭐⭐ | 密碼學/通訊 |
| DEF CON 33 (2025) | From Shanghai to the Shore - Silent Threat in Global Shipping | ⭐⭐⭐ | 海運/供應鏈 |
| DEF CON 33 (2025) | How to Fake a Badge like a Pro | ⭐⭐⭐ | 實體安全 |
| DEF CON 33 (2025) | How to secure unique ecosystem shipping 1 billion cores | ⭐⭐⭐ | ARM/安全 |
| DEF CON 33 (2025) | Inside Look at a Chinese Operational Relay Network | ⭐⭐⭐ | 網路情報 |
| DEF CON 33 (2025) | Journey to the center of the PSTN - Becoming a phone company | ⭐⭐⭐ | 電信/Phreaking |
| DEF CON 33 (2025) | Killing Killnet | ⭐⭐⭐ | 威脅情報 |
| DEF CON 33 (2025) | LLM Identifies Information Stealer Vector & Extracts IoCs | ⭐⭐⭐ | AI/惡意軟體分析 |
| DEF CON 33 (2025) | Making the DEF CON 33 Badge | ⭐⭐⭐ | 硬體/Badge |
| DEF CON 33 (2025) | Mastering Apple's Endpoint Security for macOS Malware Detection | ⭐⭐⭐ | macOS/偵測 |
| DEF CON 33 (2025) | Mind the Data Voids - Hijacking Copilot Trust | ⭐⭐⭐ | AI/供應鏈 |
| DEF CON 33 (2025) | Not Just a Pipeline Leak - tj-actions Attack | ⭐⭐⭐ | CI/CD安全 |
| DEF CON 33 (2025) | Orion - fuzzing workflow automation | ⭐⭐⭐ | Fuzzing/自動化 |
| DEF CON 33 (2025) | OverLAPS - Overriding LAPS Logic | ⭐⭐⭐ | Windows/AD |
| DEF CON 33 (2025) | Paywall Optional - Recursive Request Exploits | ⭐⭐⭐ | Web安全 |
| DEF CON 33 (2025) | Planting C4 - Cross-Compatible External C2 | ⭐⭐⭐ | 紅隊/C2 |
| DEF CON 33 (2025) | Playing Dirty Without Cheating - Getting Banned | ⭐⭐⭐ | 遊戲安全 |
| DEF CON 33 (2025) | RATs & Socks abusing Google Services | ⭐⭐⭐ | 惡意軟體/Google |
| DEF CON 33 (2025) | Remote code execution via MIDI messages | ⭐⭐⭐ | 音訊/RCE |
| DEF CON 33 (2025) | Rusty pearls - Postgres RCE on cloud databases | ⭐⭐⭐ | 資料庫/雲端 |
| DEF CON 33 (2025) | Safe Harbor or Hostile Waters - PyTorch TorchScript | ⭐⭐⭐ | AI/Python |
| DEF CON 33 (2025) | Shaking Out Shells with SSHamble | ⭐⭐⭐ | SSH/漏洞 |
| DEF CON 33 (2025) | Silent Leaks - Harvesting Secrets from Shared Linux | ⭐⭐⭐ | Linux/資訊洩漏 |
| DEF CON 33 (2025) | Siri-ously Leaky - Apple Ecosystem Attack Surfaces | ⭐⭐⭐ | Apple/隱私 |
| DEF CON 33 (2025) | So Long, and Thanks for All the Phish | ⭐⭐⭐ | 釣魚/社交工程 |
| DEF CON 33 (2025) | Stories from a Tor dev | ⭐⭐⭐ | Tor/隱私 |
| DEF CON 33 (2025) | The (Un)Rightful Heir - dMSA Is Your New Domain Admin | ⭐⭐⭐ | AD安全 |
| DEF CON 33 (2025) | The DOMino Effect - DOM Clobbering at Scale | ⭐⭐⭐ | Web安全 |
| DEF CON 33 (2025) | The One Bitcoin Heist - Hashcat puzzle solving | ⭐⭐⭐ | 密碼學/Bitcoin |
| DEF CON 33 (2025) | The Ultimate Hack - Maritime Cybersecurity from TITAN | ⭐⭐⭐ | 海運/OT安全 |
| DEF CON 33 (2025) | Thinking Like a Hacker in the Age of AI | ⭐⭐⭐ | AI/哲學 |
| DEF CON 33 (2025) | TSPU - Russia's Firewall | ⭐⭐⭐ | 審查/網路 |
| DEF CON 33 (2025) | Turning Microsoft's Login Page into Phishing Infrastructure | ⭐⭐⭐ | 釣魚/Microsoft |
| DEF CON 33 (2025) | Turning your Active Directory into attacker's C2 | ⭐⭐⭐ | AD/紅隊 |
| DEF CON 33 (2025) | Unmasking the Snitch Puck - IoT surveillance in school bathroom | ⭐⭐⭐ | IoT/隱私 |
| DEF CON 33 (2025) | Voice Cloning Air Traffic Control | ⭐⭐⭐ | AI/航空安全 |
| DEF CON 33 (2025) | Weaponizing Trust - Threat Actor Targeting Researchers | ⭐⭐⭐ | 威脅情報 |
| DEF CON 33 (2025) | What is Dead May Never Die - Ghost of IE in Windows | ⭐⭐⭐ | Windows/瀏覽器 |
| DEF CON 33 (2025) | Winners of DARPA's AI Cyber Challenge | ⭐⭐⭐ | AI/競賽 |
| DEF CON 33 (2025) | You snooze you lose - RPC-Racer winning RPC endpoints | ⭐⭐⭐ | Windows/Race Condition |
| DEF CON 32 (2024) | A Shadow Librarian - Fighting capitalism | ⭐⭐⭐ | 社會/圖書館 |
| DEF CON 32 (2024) | A Treasure Trove of Failures - Defense In Depth | ⭐⭐⭐ | 防禦策略 |
| DEF CON 32 (2024) | Abusing legacy railroad signaling systems | ⭐⭐⭐ | 鐵路/OT |
| DEF CON 32 (2024) | Access Control Done Right | ⭐⭐⭐ | 存取控制 |
| DEF CON 32 (2024) | Atomic Honeypot - MySQL Honeypot | ⭐⭐⭐ | 資料庫/蜜罐 |
| DEF CON 32 (2024) | Counter Deception - World Full of Lies | ⭐⭐⭐ | 反欺騙 |
| DEF CON 32 (2024) | Digital Emblems - markings under international law | ⭐⭐⭐ | 國際法/網路 |
| DEF CON 32 (2024) | Disenshittify or die - Cory Doctorow | ⭐⭐⭐ | 政策/科技 |
| DEF CON 32 (2024) | DIY Pharmaceuticals | ⭐⭐⭐ | 醫療/DIY |
| DEF CON 32 (2024) | Encrypted newspaper ads in 19th century | ⭐⭐⭐ | 密碼學/歷史 |
| DEF CON 32 (2024) | Engineers & Exploits - Quest for Security | ⭐⭐⭐ | 工程/安全 |
| DEF CON 32 (2024) | Evolution of RF Signal Visualization | ⭐⭐⭐ | 無線/視覺化 |
| DEF CON 32 (2024) | Fine Grained Authorisation with RBAC | ⭐⭐⭐ | 授權/存取控制 |
| DEF CON 32 (2024) | How To Keep IoT From Becoming Internet of Trash | ⭐⭐⭐ | IoT/政策 |
| DEF CON 32 (2024) | I've got 99 problems but prompt injection ain't one | ⭐⭐⭐ | AI/Prompt注入 |
| DEF CON 32 (2024) | Laundering Money | ⭐⭐⭐ | 金融犯罪 |
| DEF CON 32 (2024) | Leveraging private APNs for traffic analysis | ⭐⭐⭐ | 行動網路/監控 |
| DEF CON 32 (2024) | Making The DEF CON 32 Badge | ⭐⭐⭐ | 硬體/Badge |
| DEF CON 32 (2024) | Maturing Your Application Security Program | ⭐⭐⭐ | AppSec/流程 |
| DEF CON 32 (2024) | Measuring the Tor Network | ⭐⭐⭐ | Tor/隱私 |
| DEF CON 32 (2024) | Navigating Cyber Security Labyrinth | ⭐⭐⭐ | 職涯/教育 |
| DEF CON 32 (2024) | On Your Ocean's 11 Team, I'm the AI Guy | ⭐⭐⭐ | AI/創意 |
| DEF CON 32 (2024) | Prime Cuts from Hacker History - 40 Years of Cult of Dead Cow | ⭐⭐⭐ | 駭客文化 |
| DEF CON 32 (2024) | Protecting Everything as Code & Emerging Tech | ⭐⭐⭐ | DevOps/安全 |
| DEF CON 32 (2024) | Securing CCTV Cameras Against Blind Spots | ⭐⭐⭐ | 監控/IoT |
| DEF CON 32 (2024) | Social Engineering Like You're Picard | ⭐⭐⭐ | 社交工程 |
| DEF CON 32 (2024) | Solving Murder with strings, grep, and Perl | ⭐⭐⭐ | 取證/案例 |
| DEF CON 32 (2024) | The Darkest Side of Bug Bounty | ⭐⭐⭐ | Bug Bounty |
| DEF CON 32 (2024) | The Immortal Retrofuturism of Mainframe Computers | ⭐⭐⭐ | 大型主機 |
| DEF CON 32 (2024) | The Missing Link - How we leverage SBOMs | ⭐⭐⭐ | 供應鏈/SBOM |
| DEF CON 32 (2024) | The Rise and Fall of Binary Exploitation | ⭐⭐⭐ | 漏洞利用/歷史 |
| DEF CON 32 (2024) | Uncharted Territory - Hacking Transportation | ⭐⭐⭐ | 交通/安全 |
| DEF CON 32 (2024) | Using EPSS for Vulnerability Management | ⭐⭐⭐ | 漏洞管理 |
| DEF CON 32 (2024) | War Games - Red Team for OT | ⭐⭐⭐ | OT/紅隊 |
| DEF CON 32 (2024) | Web2 Meets Web3 - Hacking DApps | ⭐⭐⭐ | 區塊鏈/Web3 |
| DEF CON 32 (2024) | Why are you still using my server for internet access | ⭐⭐⭐ | 網路/濫用 |
| DEF CON 32 (2024) | Winning big - AppSec from Casino Industry | ⭐⭐⭐ | AppSec/產業 |
| DEF CON 31 (2023) | A Broken Marriage - Abusing Mixed Vendor Kerberos | ⭐⭐⭐ | AD/Kerberos |
| DEF CON 31 (2023) | A Different Uber Post Mortem | ⭐⭐⭐ | 事件回應 |
| DEF CON 31 (2023) | A Series of Unfortunate Events | ⭐⭐⭐ | Bug Bounty |
| DEF CON 31 (2023) | An Audacious Plan to Halt Internet's Enshittification | ⭐⭐⭐ | 政策/Cory Doctorow |
| DEF CON 31 (2023) | Assessing Security of Certificates at Scale | ⭐⭐⭐ | TLS/大規模 |
| DEF CON 31 (2023) | Boston Infinite Money Glitch | ⭐⭐⭐ | 支付/漏洞 |
| DEF CON 31 (2023) | Burrowing Through Network - Vulkan Leaks | ⭐⭐⭐ | 威脅情報 |
| DEF CON 31 (2023) | Civil Cyber Defense | ⭐⭐⭐ | 政策/防禦 |
| DEF CON 31 (2023) | Cracking Cicada 3301 | ⭐⭐⭐ | 謎題/協作 |
| DEF CON 31 (2023) | Damned if you do - risks of pointing out | ⭐⭐⭐ | 倫理/揭露 |
| DEF CON 31 (2023) | Defending KA-SAT | ⭐⭐⭐ | 衛星/防禦 |
| DEF CON 31 (2023) | Designing RFID Implants | ⭐⭐⭐ | RFID/生物駭客 |
| DEF CON 31 (2023) | Fantastic Ethertypes and Where to Find Them | ⭐⭐⭐ | 網路/協議 |
| DEF CON 31 (2023) | Hack the Future - AI Red Teaming | ⭐⭐⭐ | AI/政策 |
| DEF CON 31 (2023) | HL7Magic - Medical Data Hacking | ⭐⭐⭐ | 醫療/HL7 |
| DEF CON 31 (2023) | J4 Gate - Poker Cheating Investigation | ⭐⭐⭐ | 調查/撲克 |
| DEF CON 31 (2023) | Legend of Zelda - Use After Free (TASBot) | ⭐⭐⭐ | 遊戲/TAS |
| DEF CON 31 (2023) | Living Next Door to Russia | ⭐⭐⭐ | 地緣政治 |
| DEF CON 31 (2023) | LLMs at the Forefront - Fuzz Testing | ⭐⭐⭐ | AI/Fuzzing |
| DEF CON 31 (2023) | Look Me I'm the CEO - Real-Time Deep-Fake | ⭐⭐⭐ | AI/Deepfake |
| DEF CON 31 (2023) | Making The DEF CON 31 Badge | ⭐⭐⭐ | 硬體/Badge |
| DEF CON 31 (2023) | Meduza - exiled media vs Kremlin propaganda | ⭐⭐⭐ | 媒體/審查 |
| DEF CON 31 (2023) | Nuthin But A G Thang - Evolution of Cellular Networks | ⭐⭐⭐ | 電信/歷史 |
| DEF CON 31 (2023) | Power Corrupts - Hacking Power Management in Data Centers | ⭐⭐⭐ | 資料中心/實體 |
| DEF CON 31 (2023) | Private Until Presumed Guilty | ⭐⭐⭐ | 隱私/法律 |
| DEF CON 31 (2023) | Reproductive Justice in Digital Surveillance | ⭐⭐⭐ | 隱私/女性 |
| DEF CON 31 (2023) | Snoop on to them, as they snoop on to us | ⭐⭐⭐ | 監控/反監控 |
| DEF CON 31 (2023) | Spread spectrum in drones for anti-drone evasion | ⭐⭐⭐ | 無人機/RF |
| DEF CON 31 (2023) | The Hackers, The Lawyers, And The Defense Fund | ⭐⭐⭐ | 法律/辯護 |
| DEF CON 31 (2023) | The Internals of Veilid | ⭐⭐⭐ | P2P/隱私 |
| DEF CON 31 (2023) | There Are No Mushroom Clouds in Cyberwar | ⭐⭐⭐ | 政策/網路戰 |
| DEF CON 31 (2023) | Tracking the Worlds Dumbest Cyber-Mercenaries | ⭐⭐⭐ | 威脅情報 |
| DEF CON 31 (2023) | UNConventional Cybercrime - Bad Anti-Hacking Treaty | ⭐⭐⭐ | 法律/國際 |
| DEF CON 30 (2022) | Tracking Military Ghost Helicopters over DC | ⭐⭐⭐ | OSINT/航空 |
| DEF CON 30 (2022) | Top-performing account crackers modules | ⭐⭐⭐ | 密碼破解 |
| DEF CON 30 (2022) | Exploitation in era of Formal Verification | ⭐⭐⭐ | 形式驗證 |
| DEF CON 30 (2022) | Literal Self-Pwning - Patients Should Hack Med Tech | ⭐⭐⭐ | 醫療/倫理 |
| DEF CON 30 (2022) | Leak the Planet | ⭐⭐⭐ | 資訊洩漏/調查 |
| DEF CON 30 (2022) | Hacking Law is for Hackers | ⭐⭐⭐ | 法律 |
| DEF CON 30 (2022) | Killer Hertz | ⭐⭐⭐ | 音訊/攻擊 |
| DEF CON 30 (2022) | OpenCola The AntiSocial Network | ⭐⭐⭐ | P2P/社群 |
| DEF CON 30 (2022) | Scaling Security Researcher to Eliminate OSS Vulns | ⭐⭐⭐ | 開源/自動化 |
| DEF CON 30 (2022) | Computer Hacks in Russia-Ukraine War | ⭐⭐⭐ | 網路戰 |
| DEF CON 30 (2022) | UFOs, Alien Life, and Least Untruthful Things | ⭐⭐⭐ | UFO/哲學 |
| DEF CON 30 (2022) | Brazil Redux - Right to Repair | ⭐⭐⭐ | 維修權/政策 |
| DEF CON 30 (2022) | My First Hack Was in 1958 | ⭐⭐⭐ | 歷史/音樂 |
Member discussion