201. | Asyncio understanding async and await in Python | 2 | |
|
202. | AtlSecCon 2019 Opening Keynote Cliff Stoll | 2 | |
|
203. | SAP BusinessObjects Attacks Espionage and Poisoning of Business Intelligence Platforms DeepSec | 2 | |
|
204. | Hacking on Bug Bounties for Five Years @infosec au | 2 | |
|
205. | The Eleventh HOPE 2016 Democratizing Wireless Networks with LimeSDR | 2 | |
|
206. | DAVID FRIEDMAN Anarchy Online A World of Strong Privacy | 2 | |
|
207. | KDE on FreeBSD | 2 | |
|
208. | Poul Henning Kamp News from the ESO ELT telescope & The new NerdHouse | 2 | |
|
209. | Developing Data Mining Techniques for Intrusion Detection A Progress Report | 2 | Guide |
|
210. | Hacking Into Broadband And Broadcast TV Systems C Kasmi, P Barre and T Sabono | 2 | |
|
211. | Knockin' On MediaTek ADSP’s Door Slava Makkaveev | 2 | |
|
212. | ModJack Hijacking The MacOS Kernel Zhi Zhou | 2 | |
|
213. | Overcoming iOS Data Protection to Re enable iPhone Forensic Andrey Belenko | 2 | |
|
214. | There's a party at ring0 Tavis Ormandy, Julien Tinnes | 2 | |
|
215. | BlueHat Seattle 2019 Kubernetes Practical Attack and Defense | 2 | |
|
216. | Steven Seeley Ghost in the Windows 7 Allocator | 2 | |
|
217. | Linux tracing with LTTng | 2 | |
|
218. | Rain Forest Puppy TBD | 2 | |
|
219. | Spouseware and Stalkerware Where Do We Go from Here DefCamp 2019 | 2 | |
|
220. | HOPE X A Conversation with Edward Snowden | 2 | |
|
221. | Dismal Code Studying the Evolution of Security Bugs | 2 | |
|
222. | Forth The New Synthesis Growing Forth with preForth and seedForth | 2 | |
|
223. | Android security architecture by Nikolay Elenkov | 2 | |
|
224. | Protecting the BGP Routes to Top Level DNS Servers | 2 | |
|
225. | A Cybersecurity Imagery Problem And What We Can Do About It by Dr Victoria Baines | 2 | |
|
226. | Cracking the Craptcha Gustavo Scotti | 2 | |
|
227. | Idiomatic Rust Writing concise and elegant Rust code | 2 | |
|
228. | The Grugq | 2 | |
|
229. | BMP, The BGP Monitoring Protocol | 2 | |
|
230. | KEYNOTE ADDRESS DAVID WAJSGRAS CyCon US 2016 | 2 | |
|
231. | Quantum circuit optimisation, verification, and simulation with PyZX | 2 | |
|
232. | Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets | 2 | |
|
233. | 34C3 ChaosWest Bisq A decentralized bitcoin exchange | 2 | |
|
234. | The Eleventh HOPE 2016 Iridium Satellite Hacking | 2 | |
|
235. | Aiding Security Analytics From Dempster Shafer Theory to Anthropology | 2 | Vlog |
|
236. | 36C3 ChaosWest X11 and Wayland A tale of two implementations | 2 | |
|
237. | Inside Cybercrime Groups Harvesting Active Directory for Fun Vitali Kremez | 2 | |
|
238. | VIRTUAL LAB D1 Signal Processing with GNURadio and SDRs Ateet Kumar | 2 | |
|
239. | Electro optical Sound Eavesdropping Ben Nassi | 2 | |
|
240. | Regaining control of your smartphone with postmarketOS and Maemo Leste Status of Linux on the smart… | 2 | |
|
241. | Ian Coldwater Hello World | 2 | |
|
242. | Application of OSINT SOCMINT techniques for the detection and analysis of terrorist profiles Cyber | 2 | |
|
243. | WebHacking Training 2019 | 2 | |
|
244. | Tom Liston, RFC 3514 Compliant Pentesting Being Good While You're Being Bad | 2 | |
|
245. | Hacker History This Stuff Matters Duncan Manuts | 2 | |
|
246. | Ilfak Guilfanov Decompilers and Beyond | 2 | |
|
247. | Last Stage Of Delirium Research Group UNIX Assembly Codes Development for Vulnerabilities | 2 | |
|
248. | Multiplatform Kotlin Library Development | 2 | |
|
249. | Scanning IPv4 for Free Data and Free Shells Jordan Wright | 2 | |
|
250. | Mihaly Zagon The Only Thing That Is Constant Is Change | 2 | |
|
251. | Marcel van der Velde Trust Me Im a Social Engineer | 2 | |
|
252. | Hacking BLE Bicycle Locks For Fun And A Small Profit Vincent Tan | 2 | |
|
253. | Hackers On Planet Earth 1994 Linux | 2 | |
|
254. | X11 and Wayland A tale of two implementations Implementing the hikari window manager compositor | 2 | |
|
255. | IPv6 ¿Ventaja o Amenaza Jhon Cesar Arango | 2 | |
|
256. | Easy Local Windows Kernel Exploitation | 2 | |
|
257. | Updates from the RISC V TEE Group Working on a Trusted Execution Environment spec for RISC V | 2 | Vlog |
|
258. | 211 Introducing DeepBlueCLI a PowerShell module for hunt teaming via Windows event logs Eric Conrad | 2 | Vlog |
|
259. | Richard 'Dickie' George Keynote Life at Both Ends of the Barrel An NSA Targeting Retrospective | 2 | |
|
260. | MPTCP 20190722 1550 | 2 | |
|
261. | Hacking invisibly and silently with light and sound Matt Wixey | 2 | |
|
262. | What is my system doing Full System Observability with SystemTap | 2 | |
|
263. | Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts | 2 | |
|
264. | cognitive bias and critical thinking in open source intelligence osint benjamin br | 2 | |
|
265. | kdevelop | 2 | |
|
266. | AM Keynote by Mikko Hypponen AusCERT 2019 | 2 | |
|
267. | Lydia Nicholas Augmented Hilarity | 2 | |
|
268. | Captain Hook Pirating AVS to Bypass Exploit Mitigations | 2 | |
|
269. | State of the Art of DNS Security Bill Woodcock | 2 | |
|
270. | Building Prototypes Dan Gelbart part 1 of 18 Introduction | 2 | |
|
271. | The Heptapod project Bringing Mercurial to GitLab | 2 | |
|
272. | Bufferbloat and Beyond How we reduced delays in the Linux networking stack by order | 2 | |
|
273. | COMMSEC Blockchain And Smart Contract Attack Vectors Jorden Seet | 2 | |
|
274. | 33C3 2016 Shining some light on the Amazon Dash button | 2 | |
|
275. | The s6 supervision suite A modern alternative to systemd | 2 | |
|
276. | Tutorial my first hardware design Basic course to create a simple FPGA design using OSS tools | 2 | Tutorial |
|
277. | SAAG 20160721 1400 | 2 | |
|
278. | HTTP 3 HTTP over QUIC is the next generation | 2 | |
|
279. | Antivirus Evasion Lessons Learned Thelightcosine | 2 | |
|
280. | Hyperledger Fabric Blockchain for the Enterprise | 2 | |
|
281. | HOPE 2020 Sex Work as Artistic Practice | 2 | |
|
282. | Responsible disclosure who cares Presented By OJ Reeves and Dan Tentler | 2 | |
|
283. | tragedy oss quality 20 | 2 | |
|
284. | 19C3 2002 x86 64 ia64 architecture | 2 | |
|
285. | Introduction to Reactive Programming with RxPY | 2 | |
|
286. | Applying bug hunters methodologies to your organisation, lessons from the field | 2 | |
|
287. | The Science Behind Social Engineering And An Effective Security Culture E Nicaise | 2 | |
|
288. | Nguyen Anh Quynh Invisible Honeypot Monitoring | 2 | |
|
289. | Domonkos Tomcsanyi Hacking in Suit Smartphone, the Swiss Army Knife of Hacker | 2 | |
|
290. | OpSec for InfoSec Justin Nordine | 2 | |
|
291. | Beckstrom’s Law Rod Beckstrom Black Hat - USA - 2009 | 2 | |
|
292. | Compiling the Linux kernel with LLVM tools | 2 | |
|
293. | Keynote Video over the Internet Can we break the Net | 2 | |
|
294. | Gomobile Android development with Go | 2 | |
|
295. | Benjamin Bayart Keynote | 2 | |
|
296. | LT frederic marmond REVEN Axion Talk | 2 | |
|
297. | All Your Browsers Are Belong To Us Benjamin Watson | 2 | |
|
298. | Quantum Security and Cryptography You Are Probably Doing it Wrong | 2 | |
|
299. | SoK Cyber Insurance Technical Challenges and a System Security Roadmap | 2 | |
|
300. | Intro to Powershell Scripting for Security Brandon Morris | 2 | |
|