1. | The Grugq OPSEC Because Jail is for wuftpd | 161 | |
|
2. | 4G LTE Man In The Middle Attacks With A Hacked Femtocell Xiaodong Zou | 46 | |
|
3. | The Bug Hunter's Methodology v4 Recon Edition by 0x0G | 41 | |
|
4. | Nikola Rasovic Mobile phone surveillance with BladeRF | 38 | |
|
5. | Pacu Attack and Post Exploitation in AWS Spencer Gietzen | 33 | |
|
6. | NFC Payments The Art Of Relay And Replay Attacks Salvador Mendoza | 32 | |
|
7. | Yjs A CRDT framework for shared editing Enable shared editing in every application | 31 | |
|
8. | Jim Geovedi & Raditya Iryandi Hacking VSAT | 24 | |
|
9. | ALEXANDER BARD Paradigmatics Exploring New Technological Freedoms to Crush the Old | 17 | Vlog |
|
10. | Putting Your Mind to It Bug Bounties for 12 Months @zseano | 17 | |
|
11. | A New Era Of SSRF Exploiting Url Parsers Orange Tsai | 16 | |
|
12. | GNUNet You Broke The Internet Let's Make A GNU One sva | 16 | |
|
13. | The forgotten interface Windows named pipes by GIL COHEN | 16 | |
|
14. | Extend Emacs in C or Other Languages | 16 | |
|
15. | HOPE 2020 Keynote Jaron Lanier | 15 | |
|
16. | Fuzzing The Windows Kernel Koh Yong Chuan | 14 | |
|
17. | dqlite High availability SQLite An embeddable, distributed and fault tolerant SQL engine | 12 | |
|
18. | Justin Smith THE FUTURE OF SWISS PRIVATE BANKING MONERO | 11 | |
|
19. | Uplift your Linux systems programming skills with systemd and D Bus Practical examples and best pra… | 11 | |
|
20. | Christopher Domas The Future Of ReDynamic Binary Visualization DerbyCon 2 | 10 | |
|
21. | JSTARK1809 Fuck Gun Control 9mm | 10 | |
|
22. | It's The End Of The World As We Know It aka The New Internet Architecture | 10 | |
|
23. | Troels Henriksen Futhark A data parallel pure functional programming language com | 9 | |
|
24. | Building Prototypes Dan Gelbart part 10 of 18 Flexures | 9 | |
|
25. | The best of both worlds Static and dynamic typing in the Crystal programming language | 9 | |
|
26. | A Captive Audience Jaime Cochran | 8 | |
|
27. | Rodrigo Rubira Branco Study of Malware Obfuscation Techniques | 8 | |
|
28. | Zoz Ultimate Mobile OPSEC | 8 | |
|
29. | Reversing Cryptographic Primitives Using Quantum Computing Renaud Lifchitz | 8 | |
|
30. | DuckDB An Embeddable Analytical Database | 8 | |
|
31. | Fuzzing WinAFL | 8 | |
|
32. | Kyber and Post Quantum Crypto How does it work | 8 | |
|
33. | 34C3 2017 Reverse engineering FPGAs | 7 | |
|
34. | IronPython OMFG M Salvati | 7 | |
|
35. | Martin Armstrong The Forecaster at Hackmiami Conference 2016 | 7 | |
|
36. | God Mode Unlocked Hardware Backdoors In x86 CPUs Christopher Domas | 7 | |
|
37. | Future of Guix | 7 | |
|
38. | Dan Tentler System Shock The Shodan Computer Search Engine | 6 | |
|
39. | What the Hell is Inside There Chris Tarnovsky | 6 | |
|
40. | Pwnagotchi your new digital pet George Coldham ComfyCon AU 2020 Winter | 6 | |
|
41. | Crypto for Pentesters Thomas Ptacek, Michael Tracy | 6 | |
|
42. | Travis Goodspeed Nifty Tricks For ARM Firmware Reverse Engineering | 6 | |
|
43. | Nim on everything From microcontrollers to web sites, C and JS as intermediary languages | 6 | |
|
44. | Redox OS A safety first microkernel developed in Rust | 6 | |
|
45. | Using SELinux with container runtimes | 6 | |
|
46. | COMMSEC Breaking Siemens SIMATIC S7 PLC Protection Mechanism Gao Jian | 6 | |
|
47. | Reversing GO Binaries With Ghidra Albert Zsigovits and Dorka Palotay | 6 | |
|
48. | Ridiculous Radios Michael Ossmann | 5 | |
|
49. | 10 cool things about Exherbo | 5 | |
|
50. | Embedded FreeBSD on a five core RISC V processor using LLVM How hard can it be | 5 | |
|
51. | Hacking with Guile Or how I stopped worrying and learned to love the REPL | 5 | |
|
52. | LibrePCB Status Update The progress of LibrePCB within the last two years | 5 | Vlog |
|
53. | DNS IMAP Prepositioning Attacks Bill Woodcock | 5 | |
|
54. | Daniel Krawisz HOW TO NAP THE MOST | 5 | Guide |
|
55. | Mikko Hypponen The Cyber Arms Race | 5 | |
|
56. | 23C3 2006 eng culture jamming discordianism | 5 | |
|
57. | Writing Network Drivers in High Level Languages How to write drivers in Rust, go, C , Swift, Haskel… | 5 | Guide |
|
58. | Kris Kaspersky Remote Code Execution Through Intel CPU Bugs | 5 | |
|
59. | keynote 1 theo de raadt | 5 | |
|
60. | NixOS, a functional GNU Linux distro | 5 | |
|
61. | Joanna Rutkowska | 5 | |
|
62. | GNUnet A network protocol stack for building secure, distributed, and privacy preserving applicati… | 5 | |
|
63. | Reverse Engineering WhatsApp Encryption for Chat Manipulation and More | 5 | |
|
64. | Virtual Lab Firmware Hacking With Ghidra Thomas Roth & Dmitry Nedospasov | 5 | |
|
65. | Package management and creation in Gentoo Linux | 5 | |
|
66. | A Death in Athens The inherent Vulnerability of Lawful Intercept Programs James Bamford DeepSec 2 | 4 | |
|
67. | SHADOWPAD Chinese Espionage Malware as a Service Yi Jhen Hsieh & Joey Chen | 4 | |
|
68. | Shah Sheikh Building a Cyber Security Operations Center for SCADA ICS | 4 | |
|
69. | DPAPI and DPAPI NG Decrypting All Users' Secrets and PFX Passwords P Januskiewicz | 4 | |
|
70. | Creating GopherJS Apps with gRPC Web | 4 | |
|
71. | Introducing mediasoup A WebRTC SFU for Node js | 4 | |
|
72. | OSINT for Beginners | 4 | |
|
73. | Preparing for the OSCP Without Any PenTesting Experience Drew Jones | 4 | |
|
74. | An overview of Sozi | 4 | |
|
75. | 5 Reasons to Subscribe to All Hacking Cons today | 4 | |
|
76. | OsmocomBB A tool for GSM protocol level security analysis of GSM networks DeepSec 2010 | 4 | |
|
77. | SCCP Hacking, Attacking The SS7 & SIGTRAN Applications | 4 | |
|
78. | Purely Functional GPU Programming with Futhark | 4 | |
|
79. | Teresa Rothaar What Is a Cybersecurity Copywriter, Anyway | 4 | |
|
80. | DOSEMU and FreeDOS past, present and future | 4 | |
|
81. | How to Hack a Turned Off Computer, or Running Unsigned Code in Intel Management Engine | 4 | Guide |
|
82. | Reverse Engineering Windows Malware 101 Workshop Amanda Rousseau Workshop | 4 | |
|
83. | End to end Analysis of Domain Generating Algorithm Malware Family | 4 | |
|
84. | Going mobile with React Native and WebRTC How Jitsi Meet went from web to mobile, while sharing mos… | 4 | |
|
85. | 26C3 2009 eng conlanging 101 | 4 | |
|
86. | NetBSD A modern operating system for your retro battlestation | 4 | |
|
87. | Weblate Localize your project the developer way continously, flawlessly, community driven, and op… | 4 | |
|
88. | In Depth Analysis Of Multicast DNS And DNS Service Discovery Antonios Atlasis | 4 | |
|
89. | Grugq Meta Anti Forensics The Hash Hacking Harness | 4 | |
|
90. | Effective Threat Hunting w Open Source Tools Eric Capuano | 4 | |
|
91. | Exploit generation and JavaScript analysis automation with WinDBG | 4 | |
|
92. | Samy Kamkar The Less Hacked Path | 4 | |
|
93. | Fedora on RISC V 64 bit Introduction, Brief Overview and Latest Developments | 4 | |
|
94. | Asterisk WebRTC frontier make client SIP Phone with sipML5 and Janus Gateway Analyzing a real proj | 4 | |
|
95. | sled and rio modern database engineering with io uring | 4 | |
|
96. | Metaprogramming with Nim | 4 | |
|
97. | Gentoo Hardened | 4 | |
|
98. | Getting Started with OpenDaylight | 4 | |
|
99. | Friday Keynote by William Binney HOPE Number Nine 2012 | 4 | |
|
100. | BlueHat IL 2018 David Weston Windows Hardening with Hardware | 4 | |
|