1. | 35C3 2018 A deep dive into the world of DOS viruses deutsche Ubersetzung | 5 | |
|
2. | Martin Armstrong The Forecaster at Hackmiami Conference 2016 | 4 | |
|
3. | Spoonm Metasploit Hacking Like in the Movies Black Hat - USA - 2004 | 4 | |
|
4. | How to run Linux on RISC V with open hardware and open source FPGA tools | 4 | Guide |
|
5. | SMUGGLER Black Market Logistics Context, Threats, Methods, Future | 3 | Vlog |
|
6. | JSTARK1809 Fuck Gun Control 9mm | 3 | |
|
7. | Dragonblood: Attacking the Dragonfly Handshake of WPA3 | 3 | |
|
8. | Sniffing cable modems | 3 | |
|
9. | Using Progressive Web Apps to control IoT Using a PWA app to control an IoT device using JS framewo… | 3 | |
|
10. | The Circle of HOPE 2018 And This Is It' What Went Wrong with Surveillance Reform After Snowden | 3 | |
|
11. | HOPE 2020 Keynote Jaron Lanier | 3 | |
|
12. | MARTIN LESKOVJAN Origin and history of parallel polis | 2 | |
|
13. | en anonymous internet communication done right | 2 | |
|
14. | Justin Smith THE FUTURE OF SWISS PRIVATE BANKING MONERO | 2 | |
|
15. | An In Depth Dive into the Ethereum Protocol with Lefteris KARAPETSAS | 2 | |
|
16. | OsmocomBB A tool for GSM protocol level security analysis of GSM networks DeepSec 2010 | 2 | |
|
17. | Write and Submit your first Linux kernel Patch | 2 | |
|
18. | Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky Matt Eidelberg | 2 | |
|
19. | NLP for IAS Overview and Implementations | 2 | Guide |
|
20. | A Captive Audience Jaime Cochran | 2 | |
|
21. | Dr Istvan Szabo The History of the Hungarian Cryptography | 2 | |
|
22. | MySQL 8 0 Document Store How to Mix NoSQL & SQL in MySQL 8 0 a database where developers and DBAs | 2 | Guide |
|
23. | 19C3 2002 x86 64 ia64 architecture | 2 | |
|
24. | horizon EDA what's new | 2 | |
|
25. | Microsoft Vista NDA less The Good, The Bad, and The Ugly Chris Paget | 2 | |
|
26. | REGEXT 20170327 1520 | 2 | |
|
27. | Antivirus Evasion Lessons Learned Thelightcosine | 2 | |
|
28. | 27C3 2010 eng distributed fpga number crunching for the masses | 2 | |
|
29. | Reaching const evaluation singularity An introduction into miri and Rust's const evaluation | 2 | |
|
30. | Christina Lekati Social Engineering through Social Media | 2 | |
|
31. | Desigining Implantable Tech for Everyone | 2 | |
|
32. | It's The End Of The World As We Know It aka The New Internet Architecture | 2 | |
|
33. | Hunting Asynchronous Vulnerabilities Presented By James Kettle | 1 | |
|
34. | Breaches Are Everywhere What's a Good Security Leader to Do Richard Greenberg | 1 | |
|
35. | Redox OS A safety first microkernel developed in Rust | 1 | |
|
36. | Krack Attack Entendendo a Falha Allan Kardec | 1 | |
|
37. | Human Rights Commissioners Unite from the Region | 1 | |
|
38. | What the modem How to haunt millions of internet connections | 1 | Guide |
|
39. | NixOS, a functional GNU Linux distro | 1 | |
|
40. | Camilo Galdos | 1 | |
|
41. | RFID Chip Inside the Body Reflecting the Current State of Usage, Triggers, and Ethical Issues DeepS | 1 | |
|
42. | Inside Cybercrime Groups Harvesting Active Directory for Fun Vitali Kremez | 1 | |
|
43. | Let's play a game challenges Konrad Antonowicz, Bartosz Dzirba, Dom Storey | 1 | |
|
44. | Hyves Puppet | 1 | |
|
45. | Hacking invisibly and silently with light and sound Matt Wixey | 1 | |
|
46. | Lightning talks Marian Marinov & Yana Petrova OpenFest | 1 | |
|
47. | Build more secure apps by harnessing the power of OWASP SKF & ASVS on Kubernetes Farshad Abasi | 1 | |
|
48. | Spyros Dovas CRYPTO ENABLED TIME TRAVEL | 1 | |
|
49. | The Bug Hunter's Methodology v4 0 Recon Edition by @jhaddix NahamCon2020 | 1 | Vlog |
|
50. | JOHNSON YEUNG Digital disobedient in digital realm the Hong Kong way and its struggle | 1 | |
|
51. | FluxBB | 1 | |
|
52. | Babak Javadi Keith Howell 4140 Ways Your Alarm System Can Fail DerbyCon 2 | 1 | |
|
53. | Dive into Apple IO80211FamilyV2 | 1 | |
|
54. | 34C3 ChaosWest Bisq A decentralized bitcoin exchange | 1 | |
|
55. | Designing an ultra low overhead multithreading runtime for Nim Exposing fine grained parallelism fo… | 1 | |
|
56. | Subecz Akos Biztonsagtechnikai hianyossagok Magyarorszagon a mindennapokban | 1 | |
|
57. | LLVM @RaincodeLabs Current and future uses of LLVM in Raincode Labs products | 1 | |
|
58. | RISC V Open Hardware for Your Open Source Software | 1 | |
|
59. | JsSIP SIP in your browser | 1 | |
|
60. | DeepSec In Depth Security Conference 2018 DeepSec 2018 | 1 | |
|
61. | Simon Munnery Adventures In Undertent Heating | 1 | |
|
62. | 23C3 2006 deu konrad zuse der rechnende raum | 1 | |
|
63. | ICANN56 Wrap up Interview with Göran Marby and Steve Crocker | 1 | |
|
64. | Breaches Are Everywhere What's A Good Security Leader To Do Richard Greenberg | 1 | |
|
65. | Enterprise Security API ESAPI 2 0 Crypto Changes with Kevin Wall & the OWASP Project Portal | 1 | |
|
66. | HOPE 2020 Anatomy of an Accidental Honeypot | 1 | |
|
67. | LXDE | 1 | |
|
68. | Php And Friends Rofilingphpapplications | 1 | |
|
69. | Открытие форума PHDays 11 | 1 | |
|
70. | Smalltalk Zerooverhead | 1 | |
|
71. | The State of Crypto in Python | 1 | |
|
72. | 100Gbps for NexGen Content Distribution Networks | 1 | |
|
73. | Passphrases for Humans A Cultural Approach to Passphrase Wordlist Generation | 1 | |
|
74. | 30C3 2013 eng How to Build a Mind | 1 | Guide |
|
75. | SSL And The Future of Authenticity Moxie Marlinspike | 1 | |
|
76. | Keynote Dave Kennedy, The Five Ways the Cyber Grinch Stole Christmas | 1 | |
|
77. | Securing Modern API and Microservice Based Applications by Design | 1 | |
|
78. | Kim Crawley | 1 | |
|
79. | Caroline Sinders AI is More Than Math | 1 | |
|
80. | Fractalide and Cantor A Racket application built with Flow Based Programming | 1 | |
|
81. | HOPE X A Beautiful Mosaic Using FOIA to Fight Secrecy and Explore History | 1 | |
|
82. | Troels Henriksen Futhark A data parallel pure functional programming language com | 1 | |
|
83. | Gryffindor Pure JavaScript Covert Exploitation Matthew Toussain DerbyCon 8 | 1 | |
|
84. | Revisiting SSL TLS Implementations New Bleichenbacher Side Channels and Attacks DeepSec 2014 | 1 | |
|
85. | Plenary Kent Shuart, Dell AusCERT 2016 | 1 | |
|
86. | MODERN 20171115 0930 | 1 | |
|
87. | 34C3 2017 Designing PCBs with code deutsche Ubersetzung | 1 | |
|
88. | LibrePCB Status Update The progress of LibrePCB within the last two years | 1 | Vlog |
|
89. | 305 Better Network Defense Through Threat Injection and Hunting Zach Grace Brian Genz DerbyCon 6 | 1 | |
|
90. | Quantum Computing at Google and in the Cloud An update on Google's quantum computing program and it… | 1 | Vlog |
|
91. | Crypto for Pentesters Thomas Ptacek, Michael Tracy | 1 | |
|
92. | Easterhegg 2015 deu SDR for non noobs | 1 | |
|
93. | H2HC Hangout 3 Novidades H2HC 2014 e Underground Hacker | 1 | |
|
94. | Kate Devlin Sex Robots The Truth Behind The Headlines | 1 | |
|
95. | Marko Panc DDoS Attack Landscapes | 1 | |
|
96. | Embedded systems, the road to Linux Early boot, comparing and explaining different systems | 1 | |
|
97. | WiFi practical hacking Show me the passwords DefCamp 2018 | 1 | |
|
98. | Diana Initiative 2020 TechGirlMN Workshop 4 of 5 Basic Arduino coding using virtual Badge | 1 | |
|
99. | OpenBSD as house alarm system Openbsd is not only good for network related projects | 1 | |
|
100. | Hacking the Federal Aviation Administration | 1 | |
|