201. | Steven Seeley Ghost in the Windows 7 Allocator | 2 | |
|
202. | Captain Hook Pirating AVS to Bypass Exploit Mitigations | 2 | |
|
203. | NETCONF 20220725 1400 | 2 | |
|
204. | cognitive bias and critical thinking in open source intelligence osint benjamin br | 2 | |
|
205. | All Your Browsers Are Belong To Us Benjamin Watson | 2 | |
|
206. | Dismal Code Studying the Evolution of Security Bugs | 2 | |
|
207. | Easy Local Windows Kernel Exploitation | 2 | |
|
208. | 211 Introducing DeepBlueCLI a PowerShell module for hunt teaming via Windows event logs Eric Conrad | 2 | Vlog |
|
209. | apache wicket | 2 | |
|
210. | Hacking Into Broadband And Broadcast TV Systems C Kasmi, P Barre and T Sabono | 2 | |
|
211. | Debugging and tracing a production RabbitMQ node | 2 | |
|
212. | Farah Magrabi, Macquarie University | 2 | |
|
213. | Android security architecture by Nikolay Elenkov | 2 | |
|
214. | Hacking BLE Bicycle Locks For Fun And A Small Profit Vincent Tan | 2 | |
|
215. | Grace Nolan Condensed History of Lock Picking CrikeyCon 2017 | 2 | |
|
216. | Hacking on Bug Bounties for Five Years @infosec au | 2 | |
|
217. | Build more secure apps by harnessing the power of OWASP SKF & ASVS on Kubernetes Farshad Abasi | 2 | |
|
218. | How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers X Bai & M Zheng | 2 | |
|
219. | Building Prototypes Dan Gelbart part 1 of 18 Introduction | 2 | |
|
220. | Morgan Marquis Boire All Your Evidence Is Belong To Us Antiforensics and You | 2 | |
|
221. | Zink Update OpenGL on Vulkan upstream in mesa | 2 | |
|
222. | How Ive Broken Every Threat Intel Platform Ive Ever Had And Settled on MISP | 2 | |
|
223. | Fast QUIC sockets for cloud networking Using vector packet processing for QUIC acceleration and off… | 2 | |
|
224. | Tutorial my first hardware design Basic course to create a simple FPGA design using OSS tools | 2 | Tutorial |
|
225. | KDE on FreeBSD | 2 | |
|
226. | tragedy oss quality 20 | 2 | |
|
227. | Invited talk Draw me a Local Kernel Debugger Samuel Chevet and Clément Rouault | 2 | |
|
228. | 33C3 2016 Formal Verification of Verilog HDL with Yosys SMTBMC | 2 | Vlog |
|
229. | Black-Box Laser Fault Injection on a Secure Memory | 2 | |
|
230. | Hands on composition of basic L4Re components | 2 | |
|
231. | Janus Troelsen Utreexo A dynamic hash based accumulator data structure | 2 | |
|
232. | HTTP 3 HTTP over QUIC is the next generation | 2 | |
|
233. | Smart Sheriff, Dumb Idea Abraham Aranguren & Fabian Fässler | 2 | |
|
234. | Dr Boldizsar Bencsath What Makes the Analysis of Malware Like Duqu or Flame | 2 | |
|
235. | CB15 How South Korea Invests in Human Capital for Cyber Security by Seungjoo Gabriel Kim | 2 | |
|
236. | OpenDHT make your project distributed Use cases, new and upcoming features | 2 | |
|
237. | Adam Back PRIVACY, FUNGIBILITY & SCALE IN BITCOIN | 2 | |
|
238. | Beckstrom’s Law Rod Beckstrom Black Hat - USA - 2009 | 2 | |
|
239. | BtleJuice the Bluetooth Smart Man In The Middle Framework by Damiel Cauquil | 2 | |
|
240. | 35C3 2018 The Layman's Guide to Zero Day Engineering | 2 | Guide |
|
241. | The Conficker Mystery Mikko Hypponen | 2 | |
|
242. | How to Implement Crypto Poorly Sean Cassidy | 2 | |
|
243. | 33C3 2016 Shining some light on the Amazon Dash button | 2 | |
|
244. | Babak Javadi Keith Howell 4140 Ways Your Alarm System Can Fail DerbyCon 2 | 2 | |
|
245. | ActivityPub panel | 2 | |
|
246. | 26C3 2009 eng wikileaks release 10 | 2 | |
|
247. | Antivirus Evasion Lessons Learned Thelightcosine | 2 | |
|
248. | r2cloud Decode satellite signals on Raspberry PI | 2 | |
|
249. | Hackers On Planet Earth 1994 The 2600 Panel | 2 | |
|
250. | The Science Behind Social Engineering And An Effective Security Culture E Nicaise | 2 | |
|
251. | Integrated Spice Simulation with Kicad | 2 | |
|
252. | Hannes Mehnert MirageOS Robust operation system design from the grounds up | 2 | |
|
253. | Benjamin Bayart Keynote | 2 | |
|
254. | HUGO TESO Sweet Tools O' Mine | 6 | |
|
255. | The hidden dangers inside the platform by Mickey Shkatov and Jesse Michael | 2 | |
|
256. | What is LISP | 2 | |
|
257. | Siemens Simatic S7 PLC Exploitation Dillon Beresford | 2 | |
|
258. | Getting Started in CCDC Russell Nielsen DerbyCon 8 | 2 | |
|
259. | Hacker History This Stuff Matters Duncan Manuts | 2 | |
|
260. | Paul Sebastian Ziegler Hacking in The Far East | 2 | |
|
261. | Launching A New Password Hashing Competition Sebastien Raveau | 2 | |
|
262. | Benefits of porting Godot Engine to Vulkan List of benefits observed from porting Godot Engine to V… | 2 | |
|
263. | V6OPS 20170720 1330 | 2 | |
|
264. | When Electromagnetic Side Channels Meet Radio Transceivers Marius Muench | 2 | |
|
265. | Scanning IPv4 for Free Data and Free Shells Jordan Wright | 2 | |
|
266. | BMP, The BGP Monitoring Protocol | 2 | |
|
267. | CB14 Keren Elazari Keynote The 5 biggest problems of cyber security | 2 | |
|
268. | OSINT Tools for Security Auditing Open Source Intelligence with python tools | 2 | |
|
269. | Fuzzing Apache HTTP Server for fun and CVEs Antonio Morales | 2 | |
|
270. | MacLemon Backups occasionally | 2 | |
|
271. | Marcel van der Velde Trust Me Im a Social Engineer | 2 | |
|
272. | KEYNOTE 1 Redefining Defense Saumil Shah | 2 | |
|
273. | WebHacking Training 2019 | 2 | |
|
274. | Darshak how to turn your phone into a low cost IMSI catcher device Ravishankar Borgaonkar and Swap | 2 | Guide |
|
275. | 34C3 ChaosWest Die Programmiersprache Forth | 2 | |
|
276. | Multiplatform Kotlin Library Development | 2 | |
|
277. | TOCTOU Attacks Against Secure Boot And BootGuard Trammell Hudson & Peter Bosch | 2 | |
|
278. | 34C3 ChaosWest Bisq A decentralized bitcoin exchange | 2 | |
|
279. | Chris Hadnagy Nonverbal Human Hacking DerbyCon 2 | 2 | |
|
280. | Designing an ultra low overhead multithreading runtime for Nim Exposing fine grained parallelism fo… | 2 | |
|
281. | Electro optical Sound Eavesdropping Ben Nassi | 2 | |
|
282. | 03 Red vs Blue Modern Active Directory Attacks Defense Sean Metcalf DerbyCon 5 | 2 | |
|
283. | Last Stage Of Delirium Research Group UNIX Assembly Codes Development for Vulnerabilities | 2 | |
|
284. | Regaining control of your smartphone with postmarketOS and Maemo Leste Status of Linux on the smart… | 2 | |
|
285. | haha v8 engine go brrrrr Syed Faraz Abrar | 2 | |
|
286. | Updates from the RISC V TEE Group Working on a Trusted Execution Environment spec for RISC V | 2 | Vlog |
|
287. | Introducing Network Scout Defending The Soft Center of Your Network | 2 | |
|
288. | VIRTUAL LAB D1 Signal Processing with GNURadio and SDRs Ateet Kumar | 2 | |
|
289. | There's a party at ring0 Tavis Ormandy, Julien Tinnes | 2 | |
|
290. | Celebrating Guile 2020 Lessons Learned in the Last Lap to Guile 3 | 2 | |
|
291. | Tom Liston, RFC 3514 Compliant Pentesting Being Good While You're Being Bad | 2 | |
|
292. | Cyber Investigation OSINT of Phishing Emails Patrick Rus | 2 | |
|
293. | The Grugq | 2 | |
|
294. | Aiding Security Analytics From Dempster Shafer Theory to Anthropology | 2 | Vlog |
|
295. | Asyncio understanding async and await in Python | 2 | |
|
296. | State of the Art of DNS Security Bill Woodcock | 2 | |
|
297. | Forth The New Synthesis Growing Forth with preForth and seedForth | 2 | |
|
298. | Spouseware and Stalkerware Where Do We Go from Here DefCamp 2019 | 2 | |
|
299. | The HammerBlade RISC V Manycore A programmable, scalable RISC V fabric | 2 | |
|
300. | Protecting the BGP Routes to Top Level DNS Servers | 2 | |
|