301. | Last Stage Of Delirium Research Group UNIX Assembly Codes Development for Vulnerabilities | 2 | |
|
302. | freifunk Access is a human right | 2 | |
|
303. | Intro to Powershell Scripting for Security Brandon Morris | 2 | |
|
304. | Ruby for Pentesters Michael Tracy, Chris Rohlf, Eric Monti | 2 | |
|
305. | VIRTUAL LAB D1 Signal Processing with GNURadio and SDRs Ateet Kumar | 2 | |
|
306. | keegan ryan Hacking Cell Phone Embedded Systems | 2 | |
|
307. | LT frederic marmond REVEN Axion Talk | 2 | |
|
308. | COMMSEC Fault Injection Attacks On Secure Boot Niek Timmers and Albert Spruyt | 2 | |
|
309. | The Grugq | 2 | |
|
310. | X11 and Wayland A tale of two implementations Implementing the hikari window manager compositor | 2 | |
|
311. | YunoHost | 2 | |
|
312. | Forth The New Synthesis Growing Forth with preForth and seedForth | 2 | |
|
313. | Fraud detection and forensics on telco networks | 2 | |
|
314. | I Got 99 Trends And A Is All Of Them Steven Seeley and Roberto Suggi Liverani | 2 | |
|
315. | The art of the windows kernel fuzz Guangming Liu | 2 | |
|
316. | Developing Data Mining Techniques for Intrusion Detection A Progress Report | 2 | Guide |
|
317. | Designing functional objects with functional objects OpenSCAD Past, present and or future | 2 | |
|
318. | Gomobile Android development with Go | 2 | |
|
319. | Wireless Intrusion Detection Systems with the Raspberry Pi Chris J | 2 | |
|
320. | Building a self healing system with SaltStack | 2 | |
|
321. | The Grugq How The Leopard Hides His Spots OS X Anti Forensics Techniques | 2 | |
|
322. | Mudge Economics Physics Psycology Black Hat - USA - 2005 | 2 | Vlog |
|
323. | New GPIO interface for linux user space GPIO character device API and libgpiod | 2 | |
|
324. | 115 How to Social Engineer your way into your dream job Jason Blanchard DerbyCon 6 | 2 | Guide |
|
325. | Modern Pentest Tricks For Faster, Wider, Greater Engagements Thomas Debize | 2 | |
|
326. | 30C3 2013 eng FPGA 101 | 2 | |
|
327. | Quantum Security and Cryptography You Are Probably Doing it Wrong | 2 | |
|
328. | Nicolas Gregoire Attacking XML Preprocessing | 2 | |
|
329. | Building Prototypes Dan Gelbart part 6 of 18 Coatings | 2 | |
|
330. | OpSec for InfoSec Justin Nordine | 2 | |
|
331. | SAP BusinessObjects Attacks Espionage and Poisoning of Business Intelligence Platforms DeepSec | 2 | |
|
332. | 507 Real World Attacks VS Check box Security Brent White Tim Roberts DerbyCon 6 | 2 | |
|
333. | Launching A New Password Hashing Competition Sebastien Raveau | 2 | |
|
334. | Debugging and tracing a production RabbitMQ node | 2 | |
|
335. | The Shuttle Columbia Disaster Lessons That Were Not Learned Joel I love it when they call me | 2 | |
|
336. | CB14 Keren Elazari Keynote The 5 biggest problems of cyber security | 2 | |
|
337. | Build more secure apps by harnessing the power of OWASP SKF & ASVS on Kubernetes Farshad Abasi | 2 | |
|
338. | Microarchitectural Attacks and the Case of Meltdown and Spectre Daniel Gruss | 2 | |
|
339. | KEYNOTE 1 Redefining Defense Saumil Shah | 2 | |
|
340. | How Ive Broken Every Threat Intel Platform Ive Ever Had And Settled on MISP | 2 | |
|
341. | Building WebGPU with Rust The new foundation for graphics and compute | 2 | |
|
342. | TOCTOU Attacks Against Secure Boot And BootGuard Trammell Hudson & Peter Bosch | 2 | |
|
343. | 33C3 2016 Formal Verification of Verilog HDL with Yosys SMTBMC | 2 | Vlog |
|
344. | Our Favorite XSS Filters and How to Attack Them Eduardo Vela Nava, David Lindsay | 2 | Guide |
|
345. | 03 Red vs Blue Modern Active Directory Attacks Defense Sean Metcalf DerbyCon 5 | 2 | |
|
346. | Dr Boldizsar Bencsath What Makes the Analysis of Malware Like Duqu or Flame | 2 | |
|
347. | AV1 Codec Update | 2 | Vlog |
|
348. | Introducing Network Scout Defending The Soft Center of Your Network | 2 | |
|
349. | Hands on composition of basic L4Re components | 2 | |
|
350. | BlueHat IL 2020 Dmitry Vyukov syzkaller Adventures in Continuous Coverage guided Kernel Fuzzing | 2 | Guide |
|
351. | Cyber Investigation OSINT of Phishing Emails Patrick Rus | 2 | |
|
352. | OpenDHT make your project distributed Use cases, new and upcoming features | 2 | |
|
353. | LOLBins Nothing to LOL about Oddvar Moe DerbyCon 8 | 2 | |
|
354. | Hacker History This Stuff Matters Duncan Manuts | 2 | |
|
355. | The Conficker Mystery Mikko Hypponen | 2 | |
|
356. | Applying bug hunters methodologies to your organisation, lessons from the field | 2 | |
|
357. | Scanning IPv4 for Free Data and Free Shells Jordan Wright | 2 | |
|
358. | ActivityPub panel | 2 | |
|
359. | 24C3 2007 eng smartcard protocol sniffing high | 2 | |
|
360. | Cloudburst Hacking 3D and Breaking Out of VMware Kostya Kortchinsky Black Hat - USA - 2009 | 2 | |
|
361. | Hackers On Planet Earth 1994 The 2600 Panel | 2 | |
|
362. | Mihaly Zagon The Only Thing That Is Constant Is Change | 2 | |
|
363. | Building a distro with musl libc Why and how Alpine Linux did it | 2 | |
|
364. | Hannes Mehnert MirageOS Robust operation system design from the grounds up | 2 | |
|
365. | Ilfak Guilfanov Decompilers and Beyond | 2 | |
|
366. | DeepSec In Depth Security Conference 2018 DeepSec 2018 | 2 | |
|
367. | The hidden dangers inside the platform by Mickey Shkatov and Jesse Michael | 2 | |
|
368. | What is my system doing Full System Observability with SystemTap | 2 | |
|
369. | Quantum Computing at Google and in the Cloud An update on Google's quantum computing program and it… | 2 | Vlog |
|
370. | illumos SmartOS, specialized Type 1 Hypervisor | 2 | |
|
371. | Captain Hook Pirating AVS to Bypass Exploit Mitigations | 2 | |
|
372. | The State Of Web Browsers Vs DOM Fuzzing In 2017 By Ivan Fratric | 2 | |
|
373. | FASTCash and INJX Pure How Threat Actors Use Public Standards for Financial Fraud | 2 | |
|
374. | Easy Local Windows Kernel Exploitation | 2 | |
|
375. | Drawing PCBs with Inkscape Creating printed circuit board designs using Inkscape, SVG2Shenzhen and … | 2 | |
|
376. | Mike Schiffman The Need for an 802 11b Toolkit Black Hat - USA - 2002 | 2 | |
|
377. | Getting Started in CCDC Russell Nielsen DerbyCon 8 | 2 | |
|
378. | Paul Sebastian Ziegler Hacking in The Far East | 2 | |
|
379. | Detecting Malicious Files with YARA Rules as They Traverse the Network | 2 | Guide |
|
380. | When Electromagnetic Side Channels Meet Radio Transceivers Marius Muench | 2 | |
|
381. | BMP, The BGP Monitoring Protocol | 2 | |
|
382. | MPTCP 20190722 1550 | 2 | |
|
383. | MacLemon Backups occasionally | 2 | |
|
384. | Marcel van der Velde Trust Me Im a Social Engineer | 2 | |
|
385. | Behind the scenes of iOS and Mac Security | 2 | |
|
386. | 34C3 ChaosWest Die Programmiersprache Forth | 2 | |
|
387. | Multiplatform Kotlin Library Development | 2 | |
|
388. | Andrey Labunets and Egor Homakov OAuth 2 0 and the Road to XSS | 2 | |
|
389. | Designing an ultra low overhead multithreading runtime for Nim Exposing fine grained parallelism fo… | 2 | |
|
390. | Electro optical Sound Eavesdropping Ben Nassi | 2 | |
|
391. | Tutorial my first FPGA design Basic course to create a simple FPGA design using OSS tools | 2 | Tutorial |
|
392. | haha v8 engine go brrrrr Syed Faraz Abrar | 2 | |
|
393. | Updates from the RISC V TEE Group Working on a Trusted Execution Environment spec for RISC V | 2 | Vlog |
|
394. | The Game of Cyber Chess Cyber Mayday & the Day After by Shamane Tan | 2 | |
|
395. | Celebrating Guile 2020 Lessons Learned in the Last Lap to Guile 3 | 2 | |
|
396. | Tom Liston, RFC 3514 Compliant Pentesting Being Good While You're Being Bad | 2 | |
|
397. | NETCONF 20220725 1400 | 2 | |
|
398. | AtlSecCon 2019 Opening Keynote Cliff Stoll | 2 | |
|
399. | State of the Art of DNS Security Bill Woodcock | 2 | |
|
400. | AF KTLS TLS DTLS Linux kernel module | 2 | |
|