1. | 35C3 2018 A deep dive into the world of DOS viruses deutsche Ubersetzung | 5 | |
|
2. | Martin Armstrong The Forecaster at Hackmiami Conference 2016 | 4 | |
|
3. | Spoonm Metasploit Hacking Like in the Movies Black Hat - USA - 2004 | 4 | |
|
4. | How to run Linux on RISC V with open hardware and open source FPGA tools | 4 | Guide |
|
5. | Using Progressive Web Apps to control IoT Using a PWA app to control an IoT device using JS framewo… | 3 | |
|
6. | The Circle of HOPE 2018 And This Is It' What Went Wrong with Surveillance Reform After Snowden | 3 | |
|
7. | SMUGGLER Black Market Logistics Context, Threats, Methods, Future | 3 | Vlog |
|
8. | JSTARK1809 Fuck Gun Control 9mm | 3 | |
|
9. | Dragonblood: Attacking the Dragonfly Handshake of WPA3 | 3 | |
|
10. | HOPE 2020 Keynote Jaron Lanier | 3 | |
|
11. | Sniffing cable modems | 3 | |
|
12. | Desigining Implantable Tech for Everyone | 2 | |
|
13. | Justin Smith THE FUTURE OF SWISS PRIVATE BANKING MONERO | 2 | |
|
14. | Antivirus Evasion Lessons Learned Thelightcosine | 2 | |
|
15. | MySQL 8 0 Document Store How to Mix NoSQL & SQL in MySQL 8 0 a database where developers and DBAs | 2 | Guide |
|
16. | 19C3 2002 x86 64 ia64 architecture | 2 | |
|
17. | OsmocomBB A tool for GSM protocol level security analysis of GSM networks DeepSec 2010 | 2 | |
|
18. | 27C3 2010 eng distributed fpga number crunching for the masses | 2 | |
|
19. | NLP for IAS Overview and Implementations | 2 | Guide |
|
20. | Christina Lekati Social Engineering through Social Media | 2 | |
|
21. | Write and Submit your first Linux kernel Patch | 2 | |
|
22. | horizon EDA what's new | 2 | |
|
23. | It's The End Of The World As We Know It aka The New Internet Architecture | 2 | |
|
24. | MARTIN LESKOVJAN Origin and history of parallel polis | 2 | |
|
25. | Microsoft Vista NDA less The Good, The Bad, and The Ugly Chris Paget | 2 | |
|
26. | Dr Istvan Szabo The History of the Hungarian Cryptography | 2 | |
|
27. | REGEXT 20170327 1520 | 2 | |
|
28. | en anonymous internet communication done right | 2 | |
|
29. | An In Depth Dive into the Ethereum Protocol with Lefteris KARAPETSAS | 2 | |
|
30. | Reaching const evaluation singularity An introduction into miri and Rust's const evaluation | 2 | |
|
31. | Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky Matt Eidelberg | 2 | |
|
32. | A Captive Audience Jaime Cochran | 2 | |
|
33. | Human Rights Commissioners Unite from the Region | 1 | |
|
34. | Breaches Are Everywhere What's a Good Security Leader to Do Richard Greenberg | 1 | |
|
35. | JsSIP SIP in your browser | 1 | |
|
36. | Black Hat USA 1999 William Cheswick Keynote | 1 | |
|
37. | CB14 Keren Elazari Keynote The 5 biggest problems of cyber security | 1 | |
|
38. | Hacking the Federal Aviation Administration | 1 | |
|
39. | The Bug Hunter's Methodology v4 0 Recon Edition by @jhaddix NahamCon2020 | 1 | Vlog |
|
40. | Camilo Galdos | 1 | |
|
41. | Enterprise Security API ESAPI 2 0 Crypto Changes with Kevin Wall & the OWASP Project Portal | 1 | |
|
42. | Открытие форума PHDays 11 | 1 | |
|
43. | Walter Belgers Gigatron | 1 | |
|
44. | Olivier Thomas Hardware reverse engineering tools | 1 | |
|
45. | Let's play a game challenges Konrad Antonowicz, Bartosz Dzirba, Dom Storey | 1 | |
|
46. | The State of Crypto in Python | 1 | |
|
47. | CPU performance analysis for MySQL using Hot Cold Flame Graph | 1 | |
|
48. | Rage against the kiosk Paul James Craig | 1 | |
|
49. | SSL And The Future of Authenticity Moxie Marlinspike | 1 | |
|
50. | Modlishka Is a Mantis Eating 2FAs Lunch Lance Peterman DerbyCon 9 | 1 | |
|
51. | Hunting Asynchronous Vulnerabilities Presented By James Kettle | 1 | |
|
52. | Securing Modern API and Microservice Based Applications by Design | 1 | |
|
53. | SILUR Abusing the mastercard protocol to hack bitcoin into FIAT payment terminals | 1 | |
|
54. | Easterhegg 2015 deu SDR for non noobs | 1 | |
|
55. | DuckDB An Embeddable Analytical Database | 1 | |
|
56. | NixOS, a functional GNU Linux distro | 1 | |
|
57. | Lightning talks Marian Marinov & Yana Petrova OpenFest | 1 | |
|
58. | HOPE X A Beautiful Mosaic Using FOIA to Fight Secrecy and Explore History | 1 | |
|
59. | Introducing PS Attack, a portable PowerShell attack toolkit Jared Haight | 1 | |
|
60. | 34C3 ChaosWest Bisq A decentralized bitcoin exchange | 1 | |
|
61. | Igor Pecovnik Armbian | 1 | |
|
62. | Hacking invisibly and silently with light and sound Matt Wixey | 1 | |
|
63. | Efficient and interactive 3D point cloud processing Combining the strengths of pdal, ipyvolume and … | 1 | |
|
64. | 34C3 2017 Designing PCBs with code deutsche Ubersetzung | 1 | |
|
65. | Reverse Engineering WhatsApp Encryption for Chat Manipulation and More | 1 | |
|
66. | Breaches Are Everywhere What's A Good Security Leader To Do Richard Greenberg | 1 | |
|
67. | Gen Mark A Milley 39th Chief of Staff of the US Army CyCon US 2017 | 1 | |
|
68. | IRMA's Idemix core Understanding the crypto behind selective, unlinkable attribute disclosu | 1 | |
|
69. | Embedded systems, the road to Linux Early boot, comparing and explaining different systems | 1 | |
|
70. | Unusual lock picking | 1 | |
|
71. | RISC V Open Hardware for Your Open Source Software | 1 | |
|
72. | TRAILER PART 1 FOR THE GLORY OF THE STATE MACHINE | 1 | |
|
73. | Babak Javadi Keith Howell 4140 Ways Your Alarm System Can Fail DerbyCon 2 | 1 | |
|
74. | 35C3 2018 Mind the Trap Die Netzpolitik der AfD im Bundestag | 1 | |
|
75. | Sam Patterson OPENBAZAAR 2 0 NOW IS THE TIME TO SHIFT TO A DECENTRALIZED MARKETPLACE | 1 | |
|
76. | Keynote Dave Kennedy, The Five Ways the Cyber Grinch Stole Christmas | 1 | |
|
77. | Patrik Tjokorda BITCOIN PEER BANKING | 1 | |
|
78. | Subecz Akos Biztonsagtechnikai hianyossagok Magyarorszagon a mindennapokban | 1 | |
|
79. | 30C3 2013 eng HbbTV Security | 1 | |
|
80. | WiFi practical hacking Show me the passwords DefCamp 2018 | 1 | |
|
81. | tragedy oss quality 20 | 1 | |
|
82. | Krack Attack Entendendo a Falha Allan Kardec | 1 | |
|
83. | 99 Reasons Your Perimeter Is Leaking Evolution of CC John Askew DerbyCon 8 | 1 | |
|
84. | 23C3 2006 deu konrad zuse der rechnende raum | 1 | |
|
85. | From Gtk to Qt An Strange Journey, part 2 The continuation of the original talk from Dirk Hohndel | 1 | |
|
86. | Igniting the Open Hardware Ecosystem with RISC V SiFive's Freedom U500 is the World's First Linux c… | 1 | |
|
87. | V6OPS 20201119 0900 | 1 | |
|
88. | Inside Cybercrime Groups Harvesting Active Directory for Fun Vitali Kremez | 1 | |
|
89. | Fedora on RISC V 64 bit Introduction, Brief Overview and Latest Developments | 1 | |
|
90. | Php And Friends Rofilingphpapplications | 1 | |
|
91. | Gerd Leonhard IAPP Data Protection Congress 2016 | 1 | |
|
92. | HOPE 2020 Anatomy of an Accidental Honeypot | 1 | |
|
93. | Investigating Malware Using Memory Forensics A Practical Approach | 1 | |
|
94. | Kate Devlin Sex Robots The Truth Behind The Headlines | 1 | |
|
95. | Spyros Dovas CRYPTO ENABLED TIME TRAVEL | 1 | |
|
96. | 30C3 2013 eng How to Build a Mind | 1 | Guide |
|
97. | Smalltalk Zerooverhead | 1 | |
|
98. | Keynote Video over the Internet Can we break the Net | 1 | |
|
99. | 305 Better Network Defense Through Threat Injection and Hunting Zach Grace Brian Genz DerbyCon 6 | 1 | |
|
100. | Fractalide and Cantor A Racket application built with Flow Based Programming | 1 | |
|