| 2016-08-11 | The DEFCON CTF VM | Bincker | 2809 | |
| 2016-08-11 | Best DEF CON 24 Hacking Conference slides | Bincker | 1801 | |
| 2016-08-11 | toxic proxies bypassing https and vpns to pwn online identity | Bincker | 2391 | |
| 2016-08-11 | Pure Off-path TCP attack demo by using a side channel in Recent Linux Kernel | Bincker | 4032 | |
| 2016-08-11 | Playing Fasttracker 2 .XM files in Javascript – a1k0n.net | Bincker | 2839 | |
| 2016-08-11 | [Defcon24] Introduction to the Witchcraft Compiler Collection | Bincker | 2647 | |
| 2016-08-11 | Triton under the hood | Bincker | 2519 | |
| 2016-08-11 | IRMA v1.3.0 released | Bincker | 2298 | |
| 2016-08-11 | Keyringer: encrypted and distributed secret sharing software | Bincker | 2044 | |
| 2016-08-11 | A brief survey of Fully Homomorphic Encryption, computing on encrypted data | Bincker | 2375 | |
| 2016-08-11 | Xen exploitation part 3: XSA-182, Qubes escape | Bincker | 2194 | |
| 2016-08-11 | Xen exploitation part 2: XSA-148, from guest to host | Bincker | 1861 | |
| 2016-08-11 | Xen exploitation part 1: XSA-105, from nobody to root | Bincker | 1881 | |