| 1. | 35C3 2018 A deep dive into the world of DOS viruses deutsche Ubersetzung | 5 | |
|
| 2. | Martin Armstrong The Forecaster at Hackmiami Conference 2016 | 4 | |
|
| 3. | Spoonm Metasploit Hacking Like in the Movies Black Hat - USA - 2004 | 4 | |
|
| 4. | How to run Linux on RISC V with open hardware and open source FPGA tools | 4 | Guide |
|
| 5. | Using Progressive Web Apps to control IoT Using a PWA app to control an IoT device using JS framewo… | 3 | |
|
| 6. | HOPE 2020 Keynote Jaron Lanier | 3 | |
|
| 7. | SMUGGLER Black Market Logistics Context, Threats, Methods, Future | 3 | Vlog |
|
| 8. | Dragonblood: Attacking the Dragonfly Handshake of WPA3 | 3 | |
|
| 9. | JSTARK1809 Fuck Gun Control 9mm | 3 | |
|
| 10. | The Circle of HOPE 2018 And This Is It' What Went Wrong with Surveillance Reform After Snowden | 3 | |
|
| 11. | Sniffing cable modems | 3 | |
|
| 12. | horizon EDA what's new | 2 | |
|
| 13. | A Captive Audience Jaime Cochran | 2 | |
|
| 14. | 19C3 2002 x86 64 ia64 architecture | 2 | |
|
| 15. | Microsoft Vista NDA less The Good, The Bad, and The Ugly Chris Paget | 2 | |
|
| 16. | 27C3 2010 eng distributed fpga number crunching for the masses | 2 | |
|
| 17. | NLP for IAS Overview and Implementations | 2 | Guide |
|
| 18. | Dr Istvan Szabo The History of the Hungarian Cryptography | 2 | |
|
| 19. | Christina Lekati Social Engineering through Social Media | 2 | |
|
| 20. | Antivirus Evasion Lessons Learned Thelightcosine | 2 | |
|
| 21. | Justin Smith THE FUTURE OF SWISS PRIVATE BANKING MONERO | 2 | |
|
| 22. | OsmocomBB A tool for GSM protocol level security analysis of GSM networks DeepSec 2010 | 2 | |
|
| 23. | REGEXT 20170327 1520 | 2 | |
|
| 24. | It's The End Of The World As We Know It aka The New Internet Architecture | 2 | |
|
| 25. | Write and Submit your first Linux kernel Patch | 2 | |
|
| 26. | Reaching const evaluation singularity An introduction into miri and Rust's const evaluation | 2 | |
|
| 27. | Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky Matt Eidelberg | 2 | |
|
| 28. | MARTIN LESKOVJAN Origin and history of parallel polis | 2 | |
|
| 29. | Desigining Implantable Tech for Everyone | 2 | |
|
| 30. | en anonymous internet communication done right | 2 | |
|
| 31. | An In Depth Dive into the Ethereum Protocol with Lefteris KARAPETSAS | 2 | |
|
| 32. | MySQL 8 0 Document Store How to Mix NoSQL & SQL in MySQL 8 0 a database where developers and DBAs | 2 | Guide |
|
| 33. | Compression Oracle Attacks on VPN Networks | 1 | |
|
| 34. | Rage against the kiosk Paul James Craig | 1 | |
|
| 35. | Hacking the Federal Aviation Administration | 1 | |
|
| 36. | [CB20]Apk medit memory search and patch tool for APK without root & android NDK | 1 | |
|
| 37. | Caroline Sinders AI is More Than Math | 1 | |
|
| 38. | Opening Address by Dorothee Bär | 1 | |
|
| 39. | Microarchitectural Attacks and the Case of Meltdown and Spectre Daniel Gruss | 1 | |
|
| 40. | The Bug Hunter's Methodology v4 0 Recon Edition by @jhaddix NahamCon2020 | 1 | Vlog |
|
| 41. | Black Hat USA 1999 Jeffrey Hunker Keynote Protecting Americas Cyberspace Version 1 0 of the Nati | 1 | |
|
| 42. | Passphrases for Humans A Cultural Approach to Passphrase Wordlist Generation | 1 | |
|
| 43. | TRAILER PART 1 FOR THE GLORY OF THE STATE MACHINE | 1 | |
|
| 44. | Babak Javadi Keith Howell 4140 Ways Your Alarm System Can Fail DerbyCon 2 | 1 | |
|
| 45. | Joe McCray You spent all that money m4v | 1 | |
|
| 46. | Let's play a game challenges Konrad Antonowicz, Bartosz Dzirba, Dom Storey | 1 | |
|
| 47. | Max Hillebrand TIME TRAVELING THE TIMECHAIN WITH SCRIPTLESS SCRIPT ATOMIC UTXO SWAPS | 1 | |
|
| 48. | Simon Munnery Adventures In Undertent Heating | 1 | |
|
| 49. | Patrik Tjokorda BITCOIN PEER BANKING | 1 | |
|
| 50. | Subecz Akos Biztonsagtechnikai hianyossagok Magyarorszagon a mindennapokban | 1 | |
|
| 51. | Human Rights Commissioners Unite from the Region | 1 | |
|
| 52. | Security of GPS INS based On road Location Tracking Systems | 1 | |
|
| 53. | LXDE | 1 | |
|
| 54. | 23C3 2006 deu konrad zuse der rechnende raum | 1 | |
|
| 55. | Olivier Thomas Hardware reverse engineering tools | 1 | |
|
| 56. | Servo building a parallel web browser | 1 | |
|
| 57. | Higher Level Malware Christopher Truncer and Evan Pena | 1 | |
|
| 58. | Godot 3, libre gamedev for everyone The 2D and 3D game engine you've waited for | 1 | |
|
| 59. | Php And Friends Rofilingphpapplications | 1 | |
|
| 60. | Modlishka Is a Mantis Eating 2FAs Lunch Lance Peterman DerbyCon 9 | 1 | |
|
| 61. | H2K2 2002 Open Source Security Testing Methodology Manual | 1 | Vlog |
|
| 62. | 34C3 ChaosWest Bisq A decentralized bitcoin exchange | 1 | |
|
| 63. | Plenary Kent Shuart, Dell AusCERT 2016 | 1 | |
|
| 64. | What the Hell is Inside There Chris Tarnovsky | 1 | |
|
| 65. | 30C3 2013 eng How to Build a Mind | 1 | Guide |
|
| 66. | DuckDB An Embeddable Analytical Database | 1 | |
|
| 67. | How Secure and Quick is QUIC Provable Security and Performance Analyses | 1 | |
|
| 68. | Breaches Are Everywhere What's A Good Security Leader To Do Richard Greenberg | 1 | |
|
| 69. | Crypto for Pentesters Thomas Ptacek, Michael Tracy | 1 | |
|
| 70. | Hunting Asynchronous Vulnerabilities Presented By James Kettle | 1 | |
|
| 71. | Fractalide and Cantor A Racket application built with Flow Based Programming | 1 | |
|
| 72. | RISC V Open Hardware for Your Open Source Software | 1 | |
|
| 73. | Marko Panc DDoS Attack Landscapes | 1 | |
|
| 74. | NixOS, a functional GNU Linux distro | 1 | |
|
| 75. | MODERN 20171115 0930 | 1 | |
|
| 76. | Keynote Dave Kennedy, The Five Ways the Cyber Grinch Stole Christmas | 1 | |
|
| 77. | Diana Initiative 2020 TechGirlMN Workshop 4 of 5 Basic Arduino coding using virtual Badge | 1 | |
|
| 78. | Hacking invisibly and silently with light and sound Matt Wixey | 1 | |
|
| 79. | 26C3 2009 eng wikileaks release 10 | 1 | |
|
| 80. | PWA caching strategies How to obtain maximum performance from your Progressive web app | 1 | Guide |
|
| 81. | tragedy oss quality 20 | 1 | |
|
| 82. | Krack Attack Entendendo a Falha Allan Kardec | 1 | |
|
| 83. | 100Gbps for NexGen Content Distribution Networks | 1 | |
|
| 84. | OpenScore Open sourcing sheet music | 1 | |
|
| 85. | The Kali Linux Dojo Workshop #1 Rolling Your Own Generating Custom Kali Linux 2 | 1 | |
|
| 86. | V6OPS 20201119 0900 | 1 | |
|
| 87. | Inside Cybercrime Groups Harvesting Active Directory for Fun Vitali Kremez | 1 | |
|
| 88. | Kim Crawley | 1 | |
|
| 89. | WGCHAIRS 20181107 1235 | 1 | |
|
| 90. | Hunting For Bugs In Ethereum 2 0 by Denis Kolegov and JP Aumasson | 1 | |
|
| 91. | Redox OS A safety first microkernel developed in Rust | 1 | |
|
| 92. | Spyros Dovas CRYPTO ENABLED TIME TRAVEL | 1 | |
|
| 93. | Revisiting SSL TLS Implementations New Bleichenbacher Side Channels and Attacks DeepSec 2014 | 1 | |
|
| 94. | David Jorm AusCERT 2020 | 1 | |
|
| 95. | SSL And The Future of Authenticity Moxie Marlinspike | 1 | |
|
| 96. | RFID Chip Inside the Body Reflecting the Current State of Usage, Triggers, and Ethical Issues DeepS | 1 | |
|
| 97. | DeepSec In Depth Security Conference 2018 DeepSec 2018 | 1 | |
|
| 98. | Decompiler Internals Microcode | 1 | |
|
| 99. | Easterhegg 2015 deu SDR for non noobs | 1 | |
|
| 100. | Build more secure apps by harnessing the power of OWASP SKF & ASVS on Kubernetes Farshad Abasi | 1 | |
|