101. | Friday Keynote by William Binney HOPE Number Nine 2012 | 4 | |
|
102. | OSINT for Beginners | 4 | |
|
103. | NetBSD Not Just For Toasters | 3 | |
|
104. | Adventures in Azure Privilege Escalation Karl Fosaaen DerbyCon 9 | 3 | |
|
105. | JsSIP SIP in your browser | 3 | |
|
106. | Smart Parking Meter Implementations, Globalism, and You Joe Grand, Jacob Appelbaum, Chris Tarnovsk | 3 | |
|
107. | Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track | 3 | Vlog |
|
108. | Higher Level Malware Christopher Truncer and Evan Pena | 3 | |
|
109. | Andreas Bogk Why Choice Of Programming Language Matters | 3 | |
|
110. | Introduction to LibrePCB A new, powerful and intuitive EDA tool for everyone | 3 | |
|
111. | 35C3 2018 SymbiFlow Finally the GCC of FPGAs | 3 | |
|
112. | Car Hacking Practical Guide To Automotive Security Yogesh Ojha | 3 | |
|
113. | rust vmm shared virtualization crates | 3 | |
|
114. | IDA and Malware Reverse Eng 101 by Jake Williams | 3 | |
|
115. | Deobfuscate UEFI BIOS Malware And Virtualized Packers Alexandre Borges | 3 | |
|
116. | Everything is connected How to hack Bank Account using Instagram DeepSec 2018 | 3 | Guide |
|
117. | Inside Monero The world's first fungible cryptocurrency | 3 | |
|
118. | SPECIAL CLOSING Rop Gonggrijp | 3 | |
|
119. | Igor Pecovnik Armbian | 3 | |
|
120. | Overcoming Fear Reversing With Radare2 Arnau Gamez Montolio | 3 | |
|
121. | Andreas Antonopoulos Tsunami of Innovation | 3 | |
|
122. | Open Source Backup from Bacula to Bareos | 3 | |
|
123. | Modern Linux Heap Exploitation Dr Silvio Cesare | 3 | |
|
124. | How to Hack Medical Imaging Applications via DICOM Maria Nedyak | 3 | |
|
125. | Stupid Pluto Tricks Real world things you can do with a PlutoSDR | 3 | |
|
126. | The Pentester Blueprint A Guide to Becoming a Pentester | 3 | |
|
127. | Hannes Mehnert MirageOS what did we achieve in the last year | 3 | |
|
128. | Rooting Samsung Q60T Smart TV Jérémie Boutoille and Vincent Fargues | 3 | |
|
129. | Intel ME Flash File System Explained | 3 | |
|
130. | Optimized and reproducible HPC Software deployment with free software and GNU Guix | 3 | |
|
131. | Qi Hardware's Ben NanoNote open to the bone device | 3 | |
|
132. | Open source design ecosystems around FreeCAD | 3 | |
|
133. | Voja Antonic Hacking before computers | 3 | |
|
134. | golang, practical Go Programming | 3 | |
|
135. | SSL And The Future of Authenticity Moxie Marlinspike | 3 | |
|
136. | Renee DiResta | 3 | |
|
137. | Exploiting the iOS Kernel Stefan Esser | 3 | |
|
138. | Keynote Failure is not an Option Philippe Biondi | 3 | |
|
139. | Vanja A WinDbg full of tricks | 3 | |
|
140. | RISC V Open Hardware for Your Open Source Software | 3 | |
|
141. | Your Mind Legal Status Rights and Securing Yourself | 3 | |
|
142. | Len Sassaman Forensic Dead Ends | 3 | |
|
143. | m r Mane Piperevski Methodology for Vulnerability Research and Exploit Development | 3 | Vlog |
|
144. | Hacking with WebSockets | 3 | |
|
145. | My quest into FM RDS, Oona Raisanen | 3 | |
|
146. | Python for Godot | 3 | |
|
147. | Building Prototypes Dan Gelbart part 14 of 18 Brazing | 3 | |
|
148. | Reloading Escoria Make point and click adventure games under Godot great again | 3 | | Day of the Tentacle
|
149. | Perfectly Deniable Steganographic Disk Encryption | 3 | |
|
150. | Sophail A Critical Analysis of Sophos Antivirus Tavis Ormandy | 3 | |
|
151. | The Ultimate Study of Real Life SSL Issues Ivan Ristic | 3 | |
|
152. | Using Gerrit Code Review in an open source project | 3 | Review |
|
153. | WiFi Based IMSI Catcher Black Hat - Europe - 2016 | 3 | |
|
154. | BloodHound Head to Tail Andy Robbins Rohan Vazarkar DerbyCon 9 | 3 | |
|
155. | 0 A D Graphics Pipeline How open source game graphics works | 3 | |
|
156. | Onion adventures how to use onion services and the Tor network in your web endeavors | 3 | Guide |
|
157. | Inside Stegosploit DeepSec 2016 | 3 | |
|
158. | prompt toolkit two years later | 3 | |
|
159. | Rendering map data with Mapnik and Python | 3 | |
|
160. | Syslinux and the dynamic x86 boot process | 3 | |
|
161. | Unraveling Unicode Chris Weber Black Hat - USA - 2009 | 3 | |
|
162. | Hackfest 2016 Stephen Hall presented Your configs are bad and you should feel bad | 3 | |
|
163. | Async await in Nim A demonstration of the flexibility metaprogramming can bring to a language | 3 | |
|
164. | JavaParser where should we head How to generate, transform, analyze, refactor Java code | 3 | Guide |
|
165. | OpenBSD as house alarm system Openbsd is not only good for network related projects | 3 | |
|
166. | Analisis forense digital Yolanda Olmedo CyberCamp 2019 | 3 | |
|
167. | Using SAIL to generate GNU assembler disassembler and simulator for RISC V | 3 | |
|
168. | Bash Scripting for Pentesters by Lee Baird | 3 | |
|
169. | Reproducible packaging and distribution of software with GNU Guix Distributing software with Guix | 3 | |
|
170. | IOT Security Hack The Damn Vulnerable IoT Device Arnaud Courty | 3 | |
|
171. | 30C3 2013 eng How to Build a Mind | 3 | Guide |
|
172. | Introduction to Reactive Programming with RxPY | 2 | |
|
173. | 33C3 2016 SpinalHDL An alternative hardware description language | 2 | |
|
174. | Hyperledger Fabric Blockchain for the Enterprise | 2 | |
|
175. | SWIM Protocol to Build a Cluster SWIM gossip protocol, its implementation, and improvements | 2 | |
|
176. | Launching A New Password Hashing Competition Sebastien Raveau | 2 | |
|
177. | Invited talk Draw me a Local Kernel Debugger Samuel Chevet and Clément Rouault | 2 | |
|
178. | HOPE 2020 Sex Work as Artistic Practice | 2 | |
|
179. | Hunting PBX for Vulnerabilities | 2 | |
|
180. | 19C3 2002 x86 64 ia64 architecture | 2 | |
|
181. | A view into ALPC RPC by Clement Rouault and Thomas Imbert | 2 | |
|
182. | CB14 Keren Elazari Keynote The 5 biggest problems of cyber security | 2 | |
|
183. | Smart Sheriff, Dumb Idea Abraham Aranguren & Fabian Fässler | 2 | |
|
184. | Keynote Video over the Internet Can we break the Net | 2 | |
|
185. | Scala A Scalable Language | 2 | |
|
186. | Nguyen Anh Quynh Invisible Honeypot Monitoring | 2 | |
|
187. | Threat Hunting the macOS edition Megan Carney | 2 | |
|
188. | KEYNOTE 1 Redefining Defense Saumil Shah | 2 | |
|
189. | BtleJuice the Bluetooth Smart Man In The Middle Framework by Damiel Cauquil | 2 | |
|
190. | Domonkos Tomcsanyi Hacking in Suit Smartphone, the Swiss Army Knife of Hacker | 2 | |
|
191. | Carlos Sarraute & Javier Burroni Neural Networks | 2 | |
|
192. | The s6 supervision suite A modern alternative to systemd | 2 | |
|
193. | CLOSING KEYNOTE Richard Thieme Conspiracy Theories, Counter Intelligence & K | 2 | |
|
194. | TOCTOU Attacks Against Secure Boot And BootGuard Trammell Hudson & Peter Bosch | 2 | |
|
195. | Babak Javadi Keith Howell 4140 Ways Your Alarm System Can Fail DerbyCon 2 | 2 | |
|
196. | Hackers On Planet Earth 1994 Linux | 2 | |
|
197. | Josef Šíma ANARCHY AS A CONSERVATIVE PROGRAM | 2 | |
|
198. | AtlSecCon 2019 Opening Keynote Cliff Stoll | 2 | |
|
199. | Les véhicules autonomes, leur télémétrie et l’impact sur la sécurité Marc André Bélanger | 2 | |
|
200. | 03 Red vs Blue Modern Active Directory Attacks Defense Sean Metcalf DerbyCon 5 | 2 | |
|