101. | Asterisk WebRTC frontier make client SIP Phone with sipML5 and Janus Gateway Analyzing a real proj | 4 | |
|
102. | Saving Nostalgia Modding an Old Z80 Computer Presented By Graham Sutherland | 4 | |
|
103. | Andreas Bogk Why Choice Of Programming Language Matters | 3 | |
|
104. | Exploiting the iOS Kernel Stefan Esser | 3 | |
|
105. | How to Hack Medical Imaging Applications via DICOM Maria Nedyak | 3 | |
|
106. | Qi Hardware's Ben NanoNote open to the bone device | 3 | |
|
107. | BloodHound Head to Tail Andy Robbins Rohan Vazarkar DerbyCon 9 | 3 | |
|
108. | Rendering map data with Mapnik and Python | 3 | |
|
109. | IDA and Malware Reverse Eng 101 by Jake Williams | 3 | |
|
110. | JsSIP SIP in your browser | 3 | |
|
111. | Andreas Antonopoulos Tsunami of Innovation | 3 | |
|
112. | golang, practical Go Programming | 3 | |
|
113. | Inside Stegosploit DeepSec 2016 | 3 | |
|
114. | Hackfest 2016 Stephen Hall presented Your configs are bad and you should feel bad | 3 | |
|
115. | Igor Pecovnik Armbian | 3 | |
|
116. | 35C3 2018 SymbiFlow Finally the GCC of FPGAs | 3 | |
|
117. | Hannes Mehnert MirageOS what did we achieve in the last year | 3 | |
|
118. | RISC V Open Hardware for Your Open Source Software | 3 | |
|
119. | Modern Linux Heap Exploitation Dr Silvio Cesare | 3 | |
|
120. | OpenBSD as house alarm system Openbsd is not only good for network related projects | 3 | |
|
121. | Everything is connected How to hack Bank Account using Instagram DeepSec 2018 | 3 | Guide |
|
122. | Adventures in Azure Privilege Escalation Karl Fosaaen DerbyCon 9 | 3 | |
|
123. | Bash Scripting for Pentesters by Lee Baird | 3 | |
|
124. | Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track | 3 | Vlog |
|
125. | Intel ME Flash File System Explained | 3 | |
|
126. | Onion adventures how to use onion services and the Tor network in your web endeavors | 3 | Guide |
|
127. | NetBSD Not Just For Toasters | 3 | |
|
128. | Introduction to LibrePCB A new, powerful and intuitive EDA tool for everyone | 3 | |
|
129. | Len Sassaman Forensic Dead Ends | 3 | |
|
130. | Async await in Nim A demonstration of the flexibility metaprogramming can bring to a language | 3 | |
|
131. | Renee DiResta | 3 | |
|
132. | Sophail A Critical Analysis of Sophos Antivirus Tavis Ormandy | 3 | |
|
133. | Stupid Pluto Tricks Real world things you can do with a PlutoSDR | 3 | |
|
134. | Deobfuscate UEFI BIOS Malware And Virtualized Packers Alexandre Borges | 3 | |
|
135. | Python for Godot | 3 | |
|
136. | Analisis forense digital Yolanda Olmedo CyberCamp 2019 | 3 | |
|
137. | WiFi Based IMSI Catcher Black Hat - Europe - 2016 | 3 | |
|
138. | My quest into FM RDS, Oona Raisanen | 3 | |
|
139. | Reloading Escoria Make point and click adventure games under Godot great again | 3 | | Day of the Tentacle
|
140. | Reproducible packaging and distribution of software with GNU Guix Distributing software with Guix | 3 | |
|
141. | prompt toolkit two years later | 3 | |
|
142. | The Ultimate Study of Real Life SSL Issues Ivan Ristic | 3 | |
|
143. | Perfectly Deniable Steganographic Disk Encryption | 3 | |
|
144. | Unraveling Unicode Chris Weber Black Hat - USA - 2009 | 3 | |
|
145. | SSL And The Future of Authenticity Moxie Marlinspike | 3 | |
|
146. | Using Gerrit Code Review in an open source project | 3 | Review |
|
147. | Smart Parking Meter Implementations, Globalism, and You Joe Grand, Jacob Appelbaum, Chris Tarnovsk | 3 | |
|
148. | Your Mind Legal Status Rights and Securing Yourself | 3 | |
|
149. | 0 A D Graphics Pipeline How open source game graphics works | 3 | |
|
150. | Car Hacking Practical Guide To Automotive Security Yogesh Ojha | 3 | |
|
151. | Overcoming Fear Reversing With Radare2 Arnau Gamez Montolio | 3 | |
|
152. | Higher Level Malware Christopher Truncer and Evan Pena | 3 | |
|
153. | Inside Monero The world's first fungible cryptocurrency | 3 | |
|
154. | The Pentester Blueprint A Guide to Becoming a Pentester | 3 | |
|
155. | rust vmm shared virtualization crates | 3 | |
|
156. | JavaParser where should we head How to generate, transform, analyze, refactor Java code | 3 | Guide |
|
157. | Open source design ecosystems around FreeCAD | 3 | |
|
158. | SPECIAL CLOSING Rop Gonggrijp | 3 | |
|
159. | Using SAIL to generate GNU assembler disassembler and simulator for RISC V | 3 | |
|
160. | Syslinux and the dynamic x86 boot process | 3 | |
|
161. | Open Source Backup from Bacula to Bareos | 3 | |
|
162. | IOT Security Hack The Damn Vulnerable IoT Device Arnaud Courty | 3 | |
|
163. | Keynote Failure is not an Option Philippe Biondi | 3 | |
|
164. | Rooting Samsung Q60T Smart TV Jérémie Boutoille and Vincent Fargues | 3 | |
|
165. | 30C3 2013 eng How to Build a Mind | 3 | Guide |
|
166. | m r Mane Piperevski Methodology for Vulnerability Research and Exploit Development | 3 | Vlog |
|
167. | Optimized and reproducible HPC Software deployment with free software and GNU Guix | 3 | |
|
168. | Building Prototypes Dan Gelbart part 14 of 18 Brazing | 3 | |
|
169. | Voja Antonic Hacking before computers | 3 | |
|
170. | Vanja A WinDbg full of tricks | 3 | |
|
171. | Hacking with WebSockets | 3 | |
|
172. | WebHacking Training 2019 | 2 | |
|
173. | Android security architecture by Nikolay Elenkov | 2 | |
|
174. | DAVID FRIEDMAN Anarchy Online A World of Strong Privacy | 2 | |
|
175. | illumos SmartOS, specialized Type 1 Hypervisor | 2 | |
|
176. | Paul Sebastian Ziegler Hacking in The Far East | 2 | |
|
177. | Hands on composition of basic L4Re components | 2 | |
|
178. | 34C3 ChaosWest Bisq A decentralized bitcoin exchange | 2 | |
|
179. | Malware Protocol Simulations In Distributed Networks Fatih Ozavci | 2 | |
|
180. | Tanoy NoTTY Bose Network Access Uncontrolled | 2 | |
|
181. | FASTCash and INJX Pure How Threat Actors Use Public Standards for Financial Fraud | 2 | |
|
182. | BMP, The BGP Monitoring Protocol | 2 | |
|
183. | OpenDHT make your project distributed Use cases, new and upcoming features | 2 | |
|
184. | Last Stage Of Delirium Research Group UNIX Assembly Codes Development for Vulnerabilities | 2 | |
|
185. | cognitive bias and critical thinking in open source intelligence osint benjamin br | 2 | |
|
186. | 60 CVEs In 60 Days Eran Shimony | 2 | |
|
187. | Mike Schiffman The Need for an 802 11b Toolkit Black Hat - USA - 2002 | 2 | |
|
188. | Marcel van der Velde Trust Me Im a Social Engineer | 2 | |
|
189. | The Conficker Mystery Mikko Hypponen | 2 | |
|
190. | VIRTUAL LAB D1 Signal Processing with GNURadio and SDRs Ateet Kumar | 2 | |
|
191. | 211 Introducing DeepBlueCLI a PowerShell module for hunt teaming via Windows event logs Eric Conrad | 2 | Vlog |
|
192. | Metasploit Autopsy Reconstructing the Crime Scene Peter Silberman, Steve Davis | 2 | |
|
193. | Detecting Malicious Files with YARA Rules as They Traverse the Network | 2 | Guide |
|
194. | Multiplatform Kotlin Library Development | 2 | |
|
195. | ActivityPub panel | 2 | |
|
196. | The Grugq | 2 | |
|
197. | Hacking BLE Bicycle Locks For Fun And A Small Profit Vincent Tan | 2 | |
|
198. | Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware | 2 | |
|
199. | Electro optical Sound Eavesdropping Ben Nassi | 2 | |
|
200. | Hackers On Planet Earth 1994 The 2600 Panel | 2 | |
|