101. | DPAPI and DPAPI NG Decrypting All Users' Secrets and PFX Passwords P Januskiewicz | 4 | |
|
102. | Saving Nostalgia Modding an Old Z80 Computer Presented By Graham Sutherland | 4 | |
|
103. | Onion adventures how to use onion services and the Tor network in your web endeavors | 3 | Guide |
|
104. | My quest into FM RDS, Oona Raisanen | 3 | |
|
105. | Stupid Pluto Tricks Real world things you can do with a PlutoSDR | 3 | |
|
106. | 35C3 2018 SymbiFlow Finally the GCC of FPGAs | 3 | |
|
107. | OpenBSD as house alarm system Openbsd is not only good for network related projects | 3 | |
|
108. | Andreas Bogk Why Choice Of Programming Language Matters | 3 | |
|
109. | Keynote Failure is not an Option Philippe Biondi | 3 | |
|
110. | Adventures in Azure Privilege Escalation Karl Fosaaen DerbyCon 9 | 3 | |
|
111. | Everything is connected How to hack Bank Account using Instagram DeepSec 2018 | 3 | Guide |
|
112. | Hackfest 2016 Stephen Hall presented Your configs are bad and you should feel bad | 3 | |
|
113. | Igor Pecovnik Armbian | 3 | |
|
114. | Building Prototypes Dan Gelbart part 14 of 18 Brazing | 3 | |
|
115. | Introduction to LibrePCB A new, powerful and intuitive EDA tool for everyone | 3 | |
|
116. | JsSIP SIP in your browser | 3 | |
|
117. | Rendering map data with Mapnik and Python | 3 | |
|
118. | IDA and Malware Reverse Eng 101 by Jake Williams | 3 | |
|
119. | m r Mane Piperevski Methodology for Vulnerability Research and Exploit Development | 3 | Vlog |
|
120. | Deobfuscate UEFI BIOS Malware And Virtualized Packers Alexandre Borges | 3 | |
|
121. | BloodHound Head to Tail Andy Robbins Rohan Vazarkar DerbyCon 9 | 3 | |
|
122. | Syslinux and the dynamic x86 boot process | 3 | |
|
123. | 30C3 2013 eng How to Build a Mind | 3 | Guide |
|
124. | Python for Godot | 3 | |
|
125. | Optimized and reproducible HPC Software deployment with free software and GNU Guix | 3 | |
|
126. | Inside Stegosploit DeepSec 2016 | 3 | |
|
127. | JavaParser where should we head How to generate, transform, analyze, refactor Java code | 3 | Guide |
|
128. | Len Sassaman Forensic Dead Ends | 3 | |
|
129. | Vanja A WinDbg full of tricks | 3 | |
|
130. | IOT Security Hack The Damn Vulnerable IoT Device Arnaud Courty | 3 | |
|
131. | Reloading Escoria Make point and click adventure games under Godot great again | 3 | | Day of the Tentacle
|
132. | Bash Scripting for Pentesters by Lee Baird | 3 | |
|
133. | RISC V Open Hardware for Your Open Source Software | 3 | |
|
134. | Inside Monero The world's first fungible cryptocurrency | 3 | |
|
135. | Hacking with WebSockets | 3 | |
|
136. | Using SAIL to generate GNU assembler disassembler and simulator for RISC V | 3 | |
|
137. | The Ultimate Study of Real Life SSL Issues Ivan Ristic | 3 | |
|
138. | golang, practical Go Programming | 3 | |
|
139. | Car Hacking Practical Guide To Automotive Security Yogesh Ojha | 3 | |
|
140. | Voja Antonic Hacking before computers | 3 | |
|
141. | Reproducible packaging and distribution of software with GNU Guix Distributing software with Guix | 3 | |
|
142. | Qi Hardware's Ben NanoNote open to the bone device | 3 | |
|
143. | Renee DiResta | 3 | |
|
144. | Using Gerrit Code Review in an open source project | 3 | Review |
|
145. | Analisis forense digital Yolanda Olmedo CyberCamp 2019 | 3 | |
|
146. | Intel ME Flash File System Explained | 3 | |
|
147. | Perfectly Deniable Steganographic Disk Encryption | 3 | |
|
148. | Async await in Nim A demonstration of the flexibility metaprogramming can bring to a language | 3 | |
|
149. | Modern Linux Heap Exploitation Dr Silvio Cesare | 3 | |
|
150. | 0 A D Graphics Pipeline How open source game graphics works | 3 | |
|
151. | Unraveling Unicode Chris Weber Black Hat - USA - 2009 | 3 | |
|
152. | rust vmm shared virtualization crates | 3 | |
|
153. | SSL And The Future of Authenticity Moxie Marlinspike | 3 | |
|
154. | prompt toolkit two years later | 3 | |
|
155. | Rooting Samsung Q60T Smart TV Jérémie Boutoille and Vincent Fargues | 3 | |
|
156. | Your Mind Legal Status Rights and Securing Yourself | 3 | |
|
157. | The Pentester Blueprint A Guide to Becoming a Pentester | 3 | |
|
158. | Higher Level Malware Christopher Truncer and Evan Pena | 3 | |
|
159. | NetBSD Not Just For Toasters | 3 | |
|
160. | Open source design ecosystems around FreeCAD | 3 | |
|
161. | SPECIAL CLOSING Rop Gonggrijp | 3 | |
|
162. | Sophail A Critical Analysis of Sophos Antivirus Tavis Ormandy | 3 | |
|
163. | Exploiting the iOS Kernel Stefan Esser | 3 | |
|
164. | Open Source Backup from Bacula to Bareos | 3 | |
|
165. | WiFi Based IMSI Catcher Black Hat - Europe - 2016 | 3 | |
|
166. | Overcoming Fear Reversing With Radare2 Arnau Gamez Montolio | 3 | |
|
167. | Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track | 3 | Vlog |
|
168. | Hannes Mehnert MirageOS what did we achieve in the last year | 3 | |
|
169. | How to Hack Medical Imaging Applications via DICOM Maria Nedyak | 3 | |
|
170. | Andreas Antonopoulos Tsunami of Innovation | 3 | |
|
171. | Smart Parking Meter Implementations, Globalism, and You Joe Grand, Jacob Appelbaum, Chris Tarnovsk | 3 | |
|
172. | Adam Back PRIVACY, FUNGIBILITY & SCALE IN BITCOIN | 2 | |
|
173. | A Cybersecurity Imagery Problem And What We Can Do About It by Dr Victoria Baines | 2 | |
|
174. | Uzbl A webbrowser which adheres to the unix philosophy | 2 | |
|
175. | FASTCash and INJX Pure How Threat Actors Use Public Standards for Financial Fraud | 2 | |
|
176. | V6OPS 20170720 1330 | 2 | |
|
177. | Paul Sebastian Ziegler Hacking in The Far East | 2 | |
|
178. | Janus Troelsen Utreexo A dynamic hash based accumulator data structure | 2 | |
|
179. | KEYNOTE ADDRESS DAVID WAJSGRAS CyCon US 2016 | 2 | |
|
180. | Advanced Reconnaissance Framework Solray | 2 | |
|
181. | Detecting Malicious Files with YARA Rules as They Traverse the Network | 2 | Guide |
|
182. | Darshak how to turn your phone into a low cost IMSI catcher device Ravishankar Borgaonkar and Swap | 2 | Guide |
|
183. | Asyncio understanding async and await in Python | 2 | |
|
184. | 26C3 2009 eng wikileaks release 10 | 2 | |
|
185. | Spouseware and Stalkerware Where Do We Go from Here DefCamp 2019 | 2 | |
|
186. | DEF CON 8 V1Ru5 More Lock Picking | 2 | |
|
187. | illumos SmartOS, specialized Type 1 Hypervisor | 2 | |
|
188. | Siemens Simatic S7 PLC Exploitation Dillon Beresford | 2 | |
|
189. | The FreeBSD Foundation and How We Are Changing the World | 2 | |
|
190. | Grace Nolan Condensed History of Lock Picking CrikeyCon 2017 | 2 | |
|
191. | Regaining control of your smartphone with postmarketOS and Maemo Leste Status of Linux on the smart… | 2 | |
|
192. | 34C3 ChaosWest Honigdachs Podcast LIVE | 2 | |
|
193. | Mike Schiffman The Need for an 802 11b Toolkit Black Hat - USA - 2002 | 2 | |
|
194. | Chris Hadnagy Nonverbal Human Hacking DerbyCon 2 | 2 | |
|
195. | 24C3 2007 eng smartcard protocol sniffing high | 2 | |
|
196. | Morgan Marquis Boire All Your Evidence Is Belong To Us Antiforensics and You | 2 | |
|
197. | There's a party at ring0 Tavis Ormandy, Julien Tinnes | 2 | |
|
198. | Benefits of porting Godot Engine to Vulkan List of benefits observed from porting Godot Engine to V… | 2 | |
|
199. | Fuzzing Apache HTTP Server for fun and CVEs Antonio Morales | 2 | |
|
200. | 30C3 2013 eng FPGA 101 | 2 | |
|