301. | Updates from the RISC V TEE Group Working on a Trusted Execution Environment spec for RISC V | 2 | Vlog |
|
302. | Benefits of porting Godot Engine to Vulkan List of benefits observed from porting Godot Engine to V… | 2 | |
|
303. | Fraud detection and forensics on telco networks | 2 | |
|
304. | HTTP 3 HTTP over QUIC is the next generation | 2 | |
|
305. | The Conficker Mystery Mikko Hypponen | 2 | |
|
306. | Tom Liston, RFC 3514 Compliant Pentesting Being Good While You're Being Bad | 2 | |
|
307. | OSINT Tools for Security Auditing Open Source Intelligence with python tools | 2 | |
|
308. | Developing Data Mining Techniques for Intrusion Detection A Progress Report | 2 | Guide |
|
309. | Beckstrom’s Law Rod Beckstrom Black Hat - USA - 2009 | 2 | |
|
310. | ActivityPub panel | 2 | |
|
311. | State of the Art of DNS Security Bill Woodcock | 2 | |
|
312. | Wireless Intrusion Detection Systems with the Raspberry Pi Chris J | 2 | |
|
313. | 33C3 2016 Shining some light on the Amazon Dash button | 2 | |
|
314. | Hackers On Planet Earth 1994 The 2600 Panel | 2 | |
|
315. | Protecting the BGP Routes to Top Level DNS Servers | 2 | |
|
316. | Mudge Economics Physics Psycology Black Hat - USA - 2005 | 2 | Vlog |
|
317. | Antivirus Evasion Lessons Learned Thelightcosine | 2 | |
|
318. | Hannes Mehnert MirageOS Robust operation system design from the grounds up | 2 | |
|
319. | Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts | 2 | |
|
320. | Modern Pentest Tricks For Faster, Wider, Greater Engagements Thomas Debize | 2 | |
|
321. | The Science Behind Social Engineering And An Effective Security Culture E Nicaise | 2 | |
|
322. | The hidden dangers inside the platform by Mickey Shkatov and Jesse Michael | 2 | |
|
323. | The Eleventh HOPE 2016 Iridium Satellite Hacking | 2 | |
|
324. | Nicolas Gregoire Attacking XML Preprocessing | 2 | |
|
325. | Benjamin Bayart Keynote | 2 | |
|
326. | Steven Seeley Ghost in the Windows 7 Allocator | 2 | |
|
327. | SAP BusinessObjects Attacks Espionage and Poisoning of Business Intelligence Platforms DeepSec | 2 | |
|
328. | SWIM Protocol to Build a Cluster SWIM gossip protocol, its implementation, and improvements | 2 | |
|
329. | Dismal Code Studying the Evolution of Security Bugs | 2 | |
|
330. | Quantum circuit optimisation, verification, and simulation with PyZX | 2 | |
|
331. | A view into ALPC RPC by Clement Rouault and Thomas Imbert | 2 | |
|
332. | Hacking Into Broadband And Broadcast TV Systems C Kasmi, P Barre and T Sabono | 2 | |
|
333. | BlueHat Seattle 2019 Kubernetes Practical Attack and Defense | 2 | |
|
334. | Threat Hunting the macOS edition Megan Carney | 2 | |
|
335. | Hacking on Bug Bounties for Five Years @infosec au | 2 | |
|
336. | HOPE X A Conversation with Edward Snowden | 2 | |
|
337. | CLOSING KEYNOTE Richard Thieme Conspiracy Theories, Counter Intelligence & K | 2 | |
|
338. | Zink Update OpenGL on Vulkan upstream in mesa | 2 | |
|
339. | Ian Coldwater Hello World | 2 | |
|
340. | Les véhicules autonomes, leur télémétrie et l’impact sur la sécurité Marc André Bélanger | 2 | |
|
341. | I Got 99 Trends And A Is All Of Them Steven Seeley and Roberto Suggi Liverani | 2 | |
|
342. | Cracking the Craptcha Gustavo Scotti | 2 | |
|
343. | Slack Announcement | 2 | |
|
344. | Designing functional objects with functional objects OpenSCAD Past, present and or future | 2 | |
|
345. | 36C3 ChaosWest X11 and Wayland A tale of two implementations | 2 | |
|
346. | Claudio Guarnieri Cuckoo Sandbox Automated Malware Analysis | 2 | |
|
347. | Building a self healing system with SaltStack | 2 | |
|
348. | Responsible disclosure who cares Presented By OJ Reeves and Dan Tentler | 2 | |
|
349. | WebAssembly A New World of Native Exploits on the Browser | 2 | |
|
350. | New GPIO interface for linux user space GPIO character device API and libgpiod | 2 | |
|
351. | NFS Ganesha | 2 | |
|
352. | The Julia programming language A look at arrays and Trilinos integration | 2 | |
|
353. | Application of OSINT SOCMINT techniques for the detection and analysis of terrorist profiles Cyber | 2 | |
|
354. | Ruby for Pentesters Michael Tracy, Chris Rohlf, Eric Monti | 2 | |
|
355. | Hyperledger Fabric Blockchain for the Enterprise | 2 | |
|
356. | Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets | 2 | |
|
357. | COMMSEC Fault Injection Attacks On Secure Boot Niek Timmers and Albert Spruyt | 2 | |
|
358. | 19C3 2002 x86 64 ia64 architecture | 2 | |
|
359. | Inside Cybercrime Groups Harvesting Active Directory for Fun Vitali Kremez | 2 | |
|
360. | YunoHost | 2 | |
|
361. | Nguyen Anh Quynh Invisible Honeypot Monitoring | 2 | |
|
362. | Idiomatic Rust Writing concise and elegant Rust code | 2 | |
|
363. | Getting Started in CCDC Russell Nielsen DerbyCon 8 | 2 | |
|
364. | The s6 supervision suite A modern alternative to systemd | 2 | |
|
365. | 34C3 ChaosWest Honigdachs Podcast LIVE | 2 | |
|
366. | When Electromagnetic Side Channels Meet Radio Transceivers Marius Muench | 2 | |
|
367. | Hacking invisibly and silently with light and sound Matt Wixey | 2 | |
|
368. | DEF CON 8 V1Ru5 More Lock Picking | 2 | |
|
369. | MacLemon Backups occasionally | 2 | |
|
370. | COMMSEC Blockchain And Smart Contract Attack Vectors Jorden Seet | 2 | |
|
371. | Uzbl A webbrowser which adheres to the unix philosophy | 2 | |
|
372. | 34C3 ChaosWest Die Programmiersprache Forth | 2 | |
|
373. | Bufferbloat and Beyond How we reduced delays in the Linux networking stack by order | 2 | |
|
374. | Advanced Reconnaissance Framework Solray | 2 | |
|
375. | Designing an ultra low overhead multithreading runtime for Nim Exposing fine grained parallelism fo… | 2 | |
|
376. | IPv6 ¿Ventaja o Amenaza Jhon Cesar Arango | 2 | |
|
377. | Invited talk Draw me a Local Kernel Debugger Samuel Chevet and Clément Rouault | 2 | |
|
378. | haha v8 engine go brrrrr Syed Faraz Abrar | 2 | |
|
379. | Lydia Nicholas Augmented Hilarity | 2 | |
|
380. | Smart Sheriff, Dumb Idea Abraham Aranguren & Fabian Fässler | 2 | |
|
381. | Celebrating Guile 2020 Lessons Learned in the Last Lap to Guile 3 | 2 | |
|
382. | Cloudburst Hacking 3D and Breaking Out of VMware Kostya Kortchinsky Black Hat - USA - 2009 | 2 | |
|
383. | BtleJuice the Bluetooth Smart Man In The Middle Framework by Damiel Cauquil | 2 | |
|
384. | WebHacking Training 2019 | 2 | |
|
385. | Building a distro with musl libc Why and how Alpine Linux did it | 2 | |
|
386. | Babak Javadi Keith Howell 4140 Ways Your Alarm System Can Fail DerbyCon 2 | 2 | |
|
387. | 34C3 ChaosWest Bisq A decentralized bitcoin exchange | 2 | |
|
388. | DeepSec In Depth Security Conference 2018 DeepSec 2018 | 2 | |
|
389. | r2cloud Decode satellite signals on Raspberry PI | 2 | |
|
390. | Last Stage Of Delirium Research Group UNIX Assembly Codes Development for Vulnerabilities | 2 | |
|
391. | Quantum Computing at Google and in the Cloud An update on Google's quantum computing program and it… | 2 | Vlog |
|
392. | Integrated Spice Simulation with Kicad | 2 | |
|
393. | VIRTUAL LAB D1 Signal Processing with GNURadio and SDRs Ateet Kumar | 2 | |
|
394. | The State Of Web Browsers Vs DOM Fuzzing In 2017 By Ivan Fratric | 2 | |
|
395. | HUGO TESO Sweet Tools O' Mine | 5 | |
|
396. | The Grugq | 2 | |
|
397. | Drawing PCBs with Inkscape Creating printed circuit board designs using Inkscape, SVG2Shenzhen and … | 2 | |
|
398. | Applying bug hunters methodologies to your organisation, lessons from the field | 2 | |
|
399. | Forth The New Synthesis Growing Forth with preForth and seedForth | 2 | |
|
400. | 33C3 2016 SpinalHDL An alternative hardware description language | 2 | |
|