1. | 35C3 2018 A deep dive into the world of DOS viruses deutsche Ubersetzung | 5 | |
|
2. | Martin Armstrong The Forecaster at Hackmiami Conference 2016 | 4 | |
|
3. | How to run Linux on RISC V with open hardware and open source FPGA tools | 4 | Guide |
|
4. | Spoonm Metasploit Hacking Like in the Movies Black Hat - USA - 2004 | 4 | |
|
5. | HOPE 2020 Keynote Jaron Lanier | 3 | |
|
6. | Sniffing cable modems | 3 | |
|
7. | Using Progressive Web Apps to control IoT Using a PWA app to control an IoT device using JS framewo… | 3 | |
|
8. | JSTARK1809 Fuck Gun Control 9mm | 3 | |
|
9. | Dragonblood: Attacking the Dragonfly Handshake of WPA3 | 3 | |
|
10. | SMUGGLER Black Market Logistics Context, Threats, Methods, Future | 3 | Vlog |
|
11. | The Circle of HOPE 2018 And This Is It' What Went Wrong with Surveillance Reform After Snowden | 3 | |
|
12. | MARTIN LESKOVJAN Origin and history of parallel polis | 2 | |
|
13. | REGEXT 20170327 1520 | 2 | |
|
14. | 19C3 2002 x86 64 ia64 architecture | 2 | |
|
15. | OsmocomBB A tool for GSM protocol level security analysis of GSM networks DeepSec 2010 | 2 | |
|
16. | Write and Submit your first Linux kernel Patch | 2 | |
|
17. | Reaching const evaluation singularity An introduction into miri and Rust's const evaluation | 2 | |
|
18. | Antivirus Evasion Lessons Learned Thelightcosine | 2 | |
|
19. | MySQL 8 0 Document Store How to Mix NoSQL & SQL in MySQL 8 0 a database where developers and DBAs | 2 | Guide |
|
20. | Justin Smith THE FUTURE OF SWISS PRIVATE BANKING MONERO | 2 | |
|
21. | Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky Matt Eidelberg | 2 | |
|
22. | A Captive Audience Jaime Cochran | 2 | |
|
23. | en anonymous internet communication done right | 2 | |
|
24. | Microsoft Vista NDA less The Good, The Bad, and The Ugly Chris Paget | 2 | |
|
25. | 27C3 2010 eng distributed fpga number crunching for the masses | 2 | |
|
26. | An In Depth Dive into the Ethereum Protocol with Lefteris KARAPETSAS | 2 | |
|
27. | horizon EDA what's new | 2 | |
|
28. | NLP for IAS Overview and Implementations | 2 | Guide |
|
29. | Christina Lekati Social Engineering through Social Media | 2 | |
|
30. | Dr Istvan Szabo The History of the Hungarian Cryptography | 2 | |
|
31. | Desigining Implantable Tech for Everyone | 2 | |
|
32. | It's The End Of The World As We Know It aka The New Internet Architecture | 2 | |
|
33. | 34C3 ChaosWest Bisq A decentralized bitcoin exchange | 1 | |
|
34. | Dive into Apple IO80211FamilyV2 | 1 | |
|
35. | Servo building a parallel web browser | 1 | |
|
36. | Gryffindor Pure JavaScript Covert Exploitation Matthew Toussain DerbyCon 8 | 1 | |
|
37. | Human Rights Commissioners Unite from the Region | 1 | |
|
38. | What the modem How to haunt millions of internet connections | 1 | Guide |
|
39. | RISC V Open Hardware for Your Open Source Software | 1 | |
|
40. | LLVM @RaincodeLabs Current and future uses of LLVM in Raincode Labs products | 1 | |
|
41. | H2K2 2002 Open Source Security Testing Methodology Manual | 1 | Vlog |
|
42. | 305 Better Network Defense Through Threat Injection and Hunting Zach Grace Brian Genz DerbyCon 6 | 1 | |
|
43. | Let's play a game challenges Konrad Antonowicz, Bartosz Dzirba, Dom Storey | 1 | |
|
44. | Hyves Puppet | 1 | |
|
45. | Breaches Are Everywhere What's A Good Security Leader To Do Richard Greenberg | 1 | |
|
46. | ICANN56 Wrap up Interview with Göran Marby and Steve Crocker | 1 | |
|
47. | How Secure and Quick is QUIC Provable Security and Performance Analyses | 1 | |
|
48. | Kate Devlin Sex Robots The Truth Behind The Headlines | 1 | |
|
49. | The Bug Hunter's Methodology v4 0 Recon Edition by @jhaddix NahamCon2020 | 1 | Vlog |
|
50. | JOHNSON YEUNG Digital disobedient in digital realm the Hong Kong way and its struggle | 1 | |
|
51. | Smalltalk Zerooverhead | 1 | |
|
52. | Decompiler Internals Microcode | 1 | |
|
53. | WiFi practical hacking Show me the passwords DefCamp 2018 | 1 | |
|
54. | Babak Javadi Keith Howell 4140 Ways Your Alarm System Can Fail DerbyCon 2 | 1 | |
|
55. | Investigating Malware Using Memory Forensics A Practical Approach | 1 | |
|
56. | Compression Oracle Attacks on VPN Networks | 1 | |
|
57. | Keynote Dave Kennedy, The Five Ways the Cyber Grinch Stole Christmas | 1 | |
|
58. | Post quantum digital signature with OQRNG optical quantum random number generator DefCamp 2019 | 1 | |
|
59. | Adrian Wiesmann Fear, uncertain'ty and banking credentials | 1 | |
|
60. | Subecz Akos Biztonsagtechnikai hianyossagok Magyarorszagon a mindennapokban | 1 | |
|
61. | Keynote Video over the Internet Can we break the Net | 1 | |
|
62. | Microarchitectural Attacks and the Case of Meltdown and Spectre Daniel Gruss | 1 | |
|
63. | OpenWISP2 a self hosted solution to control OpenWRT LEDE devices | 1 | |
|
64. | 23C3 2006 deu konrad zuse der rechnende raum | 1 | |
|
65. | Introduction to LibrePCB A new, powerful and intuitive EDA tool for everyone | 1 | |
|
66. | Joe McCray You spent all that money m4v | 1 | |
|
67. | Krack Attack Entendendo a Falha Allan Kardec | 1 | |
|
68. | OpenBSD as house alarm system Openbsd is not only good for network related projects | 1 | |
|
69. | Opening Address by Dorothee Bär | 1 | |
|
70. | Php And Friends Rofilingphpapplications | 1 | |
|
71. | Will Dayble Design as if the User Is Drunk | 1 | |
|
72. | Godot 3, libre gamedev for everyone The 2D and 3D game engine you've waited for | 1 | |
|
73. | Inside Cybercrime Groups Harvesting Active Directory for Fun Vitali Kremez | 1 | |
|
74. | My Ticks Don't Lie New Timing Attacks for Hypervisor Detection | 1 | |
|
75. | Open Source Firmware at Facebook If you don't own your firmware, your firmware owns you | 1 | |
|
76. | 30C3 2013 eng How to Build a Mind | 1 | Guide |
|
77. | What the Hell is Inside There Chris Tarnovsky | 1 | |
|
78. | Spyros Dovas CRYPTO ENABLED TIME TRAVEL | 1 | |
|
79. | Kristy Roschke, News Co Lab at Arizona State University | 1 | |
|
80. | Lightning talks Marian Marinov & Yana Petrova OpenFest | 1 | |
|
81. | tragedy oss quality 20 | 1 | |
|
82. | Fractalide and Cantor A Racket application built with Flow Based Programming | 1 | |
|
83. | 99 Reasons Your Perimeter Is Leaking Evolution of CC John Askew DerbyCon 8 | 1 | |
|
84. | FluxBB | 1 | |
|
85. | V6OPS 20201119 0900 | 1 | |
|
86. | MODERN 20171115 0930 | 1 | |
|
87. | Fedora on RISC V 64 bit Introduction, Brief Overview and Latest Developments | 1 | |
|
88. | Designing an ultra low overhead multithreading runtime for Nim Exposing fine grained parallelism fo… | 1 | |
|
89. | Igor Pecovnik Armbian | 1 | |
|
90. | Igniting the Open Hardware Ecosystem with RISC V SiFive's Freedom U500 is the World's First Linux c… | 1 | |
|
91. | DeepSec In Depth Security Conference 2018 DeepSec 2018 | 1 | |
|
92. | PWA caching strategies How to obtain maximum performance from your Progressive web app | 1 | Guide |
|
93. | Reverse Engineering WhatsApp Encryption for Chat Manipulation and More | 1 | |
|
94. | Gen Mark A Milley 39th Chief of Staff of the US Army CyCon US 2017 | 1 | |
|
95. | Higher Level Malware Christopher Truncer and Evan Pena | 1 | |
|
96. | HOPE 2020 Anatomy of an Accidental Honeypot | 1 | |
|
97. | Black Hat USA 1999 William Cheswick Keynote | 1 | |
|
98. | Introducing PS Attack, a portable PowerShell attack toolkit Jared Haight | 1 | |
|
99. | Redox OS A safety first microkernel developed in Rust | 1 | |
|
100. | CB14 Keren Elazari Keynote The 5 biggest problems of cyber security | 1 | |
|