1. | ALFONSO MUÑOZ & MIGUEL HERNANDEZ InSecurity graph database in real world | 0 | |
|
2. | OMAR BENJUMEA DevOPS & Fondue YouTube | 0 | |
|
3. | David Meléndez IoT Masterchef Cocinando un dron para hacking | 0 | |
|
4. | AUTHENTICODE PARA MALOTES Ramon Pinuaga | 0 | |
|
5. | MIKAEL CHALA Seguridad en operadores móviles virtuales | 0 | |
|
6. | Dani cr0hn García Crawlino the new level of the crawling systems | 0 | |
|
7. | MIKKO HYPPONEN World War I | 0 | |
|
8. | CCC Camp 2011 laptop and electronics searches at the us border eng | 0 | |
|
9. | HUGO TESO Comunidad de investigación sobre seguridad en aviación | 0 | |
|
10. | Proposal for an open and democratic Design Rule format A missing piece in the open source EDA world | 0 | |
|
11. | MIKAEL CHALA Seguridad en operadores móviles virtuales | 0 | |
|
12. | Victor M Mundilla & José Torres Seguro que son seguras | 0 | |
|
13. | Jorge Bermúdez LECr elviervice Pack 2 Criminal Procedure Act | 0 | |
|
14. | x509 is considered harmful | 0 | |
|
15. | Raúl Siles iOS Regreso al futuro | 0 | |
|
16. | Jess Dodson Women's Stories from the Tech Trenches CrikeyCon 2019 | 0 | |
|
17. | DAVID MELENDEZ De casa se viene llorado | 0 | |
|
18. | Juan Vazquez & Julián Vilas A patadas con mi SCADA | 0 | |
|
19. | Streamline security with shift left A cloud approach by Avinash Jain | 0 | |
|
20. | Follow Your Celery Tasks | 0 | |
|
21. | José Pico & David Pérez Atacando 3G | 0 | |
|
22. | Eisenhower and the Internet | 0 | |
|
23. | Dangerous Hare Hanging Attribute References Hazards Due to Vendor Customization | 0 | |
|
24. | Discovering C&C in Malicious PDF with obfuscation, encoding and other techniques by Filipi | 0 | |
|
25. | Hackers Don't Wear Black Hoodies, They Wear Capes by Chloé Messdaghi | 0 | |
|
26. | NMRG 20190328 1350 | 0 | |
|
27. | Demistifying a Malware Attack by Christopher Elisan | 0 | |
|
28. | Getting Shells When Metasploit Fails Ryan Linn | 0 | |
|
29. | CB13 Keynote CTF All the Cool Kids are doing it by Chris Eagle | 0 | |
|
30. | Keeping Up With Modern Automotive Exploitation by Kamel Ghali | 0 | |
|
31. | IoT and JTAG Primer by Michel Chamberland | 0 | |
|
32. | Natalie Silvanovich Many More Tamagotchis Were Harmed in the Making of this Presentation | 0 | |
|
33. | Alessandra Monteiro Privacidade e Monitoramento Uma perspectiva LGPD e GDPR | 0 | |
|
34. | Building a cheap laser harp for percussionists | 0 | |
|
35. | Windows Heap Protection Bypassing requires understanding DeepSec 2007 | 0 | |
|
36. | Gedeane Kenshima Eletrônica é coisa de criança sim | 0 | |
|
37. | Cocomazzi Win Priv Esc Still abusing local service accounts to get SYSTEM priv | 0 | |
|
38. | Сравнение эффективности средств защиты информации от несанкционированного доступа | 0 | |
|
39. | Música e Gastronomia | 0 | |
|
40. | Detecting Credential Compromise in AWS | 0 | |
|
41. | Foreign Packages In Gnu Guix | 0 | |
|
42. | Blinded Random Block Corruption Attacks Rodrigo Rubira Branco | 0 | |
|
43. | Live Streaming Sessione mattutina Morning Session see description | 0 | |
|
44. | BitCracker BitLocker Meets GPUs DeepSec 2017 | 0 | |
|
45. | Threat Intelligence Benefícios e metodologia Joel Fabiani | 0 | Vlog |
|
46. | The SEArt of War The CHIMAERA Threat Model Christina Lekat & Tigran Terpandjan | 0 | |
|
47. | STAR a Python Pandas dressing | 0 | |
|
48. | Alexander Stirov Reverse Engineering Microsoft Binaries 512kb | 0 | |
|
49. | Camilla Martins & Rob Robert Under Attack | 0 | |
|
50. | Day 3 afternoon Thursday, July 26 | 0 | |
|
51. | Fireside Chat Matthew Prince and Joyce Hakmeh | 0 | |
|
52. | Choose Your Own TTX Redefining the Incident Response Table Top Exercise Jamison Budacki DerbyCon 9 | 0 | |
|
53. | NETCONF 20170328 1640 | 0 | |
|
54. | Designing Platforms for Digital Rights a Fireside Chat with Google, Facebook, and Twitter | 0 | |
|
55. | Yumi Ambriola Grafos e machine learning para análise de dados públicos | 0 | |
|
56. | Nestori Syynimaa Attacking AAD abusing Synch API The story behind 40k$ bounties | 0 | |
|
57. | brendan dolan gavitt Dynamic Analysis Kung Fu with PANDA | 0 | |
|
58. | The Software Developer’s Guide to Open Source Hardware | 0 | Guide |
|
59. | PACU AWS Exploitation framework by Julio Melo | 0 | |
|
60. | Losing a Battle We Didn't Know We Were Fighting | 0 | |
|
61. | Cleber Brandão Como a tecnologia pode salvar sua vida | 0 | Vlog |
|
62. | Investigating Malware using Registry Forensics Jason Hale | 0 | |
|
63. | Hackable Security Modules Reversing and exploiting a FIPS | 0 | |
|
64. | Threat Hunting y simulacion de ataques Lorien Doménech y Carlos Caballero CyberCamp 2019 | 0 | |
|
65. | 31C3 2014 eng Global Civil Society Under Attack | 0 | |
|
66. | Travis Goodspeed Recent Experiments with Mask ROMs | 0 | |
|
67. | filetroles Proativos para proteger seu código e implementações Max Soler | 0 | |
|
68. | Hacking at the ECSC DefCamp 2018 | 0 | |
|
69. | Reverse Engineering Satellite Based IP Content Distribution | 0 | |
|
70. | Компания VK генеральный медиапартнер киберфестиваля Positive Hack Days 12 | 0 | |
|
71. | Square Kilometre Array and its Software Defined Supercomputer and a very fast parallel file sys… | 0 | |
|
72. | Alex Radocea Snow Crashing Virtual Reality 2019 Edition a45zewC5K1XGs | 0 | |
|
73. | Compartilhamento de ameaças cibernéticas Bruno Guerreiro Diniz | 0 | |
|
74. | Defending against PowerShell Attacks Lee Holmes DerbyCon 7 | 0 | |
|
75. | satoshi tanda Monitoring controlling kernel mode events by HyperPlatform | 0 | |
|
76. | 35C3 2018 The good, the strange and the ugly in 2018 art &tech traduction francaise | 0 | |
|
77. | Building Prototypes Part 12 of 18 Plastics Forming and Casting | 0 | |
|
78. | Безопасность и телеком стало лучше или хуже | 0 | |
|
79. | Sebastien Doucet 64 bit Imports Rebuilding and Unpacking Part1 | 0 | |
|
80. | CALEXT WG Interim Meeting, 2019 10 10 | 0 | |
|
81. | Opening Ceremony | 0 | |
|
82. | 34C3 2017 The divine Computer Science english translation | 0 | |
|
83. | PANRG 20190328 0900 | 0 | |
|
84. | Уязвимости в телефонных банках раскрытие личных данных и кража денег со счетов | 0 | |
|
85. | matt oh Reverse Engineering Flash Memory For Fun and Benefit | 0 | |
|
86. | Targeted DOS Attack and various fun with GSM Um DeepSec 2010 | 0 | |
|
87. | MLATS Making Global Data Request Treaties Work for Human Rights | 0 | |
|
88. | NMRG Interim Meeting, 2020 04 14 | 0 | |
|
89. | Once Upon a Time in the West A story on DNS Attacks Valentina Palacin, Ruth Esmeralda Barbacil | 0 | |
|
90. | Умный автомобиль как оружие | 0 | |
|
91. | yuriy bulygin oleksandr bazhaniuk Attacking and Defending BIOS in 2015 | 0 | |
|
92. | de licht in den vorratsdatendschungel 1 | 0 | |
|
93. | Maddie Stone The path to the payload Android Edition J3ZnNl2GYjEfa | 0 | |
|
94. | Tony Abbey The 1949 EDSAC Computer Rebuild | 0 | |
|
95. | New Tales of Wireless Input Devices Matthias Deeg, Gerhard Klostermeier | 0 | |
|
96. | Privacy and Security in the Internet of Things | 0 | |
|
97. | andrzej dereszowski FunCap | 0 | |
|
98. | Tutorial ISP Security Real World Techniques II | 0 | Tutorial |
|
99. | alex ionescu Fun with Sam Inside the Surface Aggregator Module | 0 | |
|
100. | 21C3 2004 Siegerehrung Lockpicking | 0 | |
|