301. | ModJack Hijacking The MacOS Kernel Zhi Zhou | 2 | |
|
302. | TOCTOU Attacks Against Secure Boot And BootGuard Trammell Hudson & Peter Bosch | 2 | |
|
303. | HUGO TESO Sweet Tools O' Mine | 6 | |
|
304. | Threat Hunting the macOS edition Megan Carney | 2 | |
|
305. | Benefits of porting Godot Engine to Vulkan List of benefits observed from porting Godot Engine to V… | 2 | |
|
306. | Introducing Network Scout Defending The Soft Center of Your Network | 2 | |
|
307. | Smart Sheriff, Dumb Idea Abraham Aranguren & Fabian Fässler | 2 | |
|
308. | A view into ALPC RPC by Clement Rouault and Thomas Imbert | 2 | |
|
309. | What is LISP | 2 | |
|
310. | Cyber Investigation OSINT of Phishing Emails Patrick Rus | 2 | |
|
311. | BtleJuice the Bluetooth Smart Man In The Middle Framework by Damiel Cauquil | 2 | |
|
312. | CLOSING KEYNOTE Richard Thieme Conspiracy Theories, Counter Intelligence & K | 2 | |
|
313. | OSINT Tools for Security Auditing Open Source Intelligence with python tools | 2 | |
|
314. | KEYNOTE 1 Redefining Defense Saumil Shah | 2 | |
|
315. | Babak Javadi Keith Howell 4140 Ways Your Alarm System Can Fail DerbyCon 2 | 2 | |
|
316. | Les véhicules autonomes, leur télémétrie et l’impact sur la sécurité Marc André Bélanger | 2 | |
|
317. | 211 Introducing DeepBlueCLI a PowerShell module for hunt teaming via Windows event logs Eric Conrad | 2 | Vlog |
|
318. | apache wicket | 2 | |
|
319. | Integrated Spice Simulation with Kicad | 2 | |
|
320. | WebAssembly A New World of Native Exploits on the Browser | 2 | |
|
321. | Building Prototypes Dan Gelbart part 1 of 18 Introduction | 2 | |
|
322. | All Your Browsers Are Belong To Us Benjamin Watson | 2 | |
|
323. | New GPIO interface for linux user space GPIO character device API and libgpiod | 2 | |
|
324. | The Julia programming language A look at arrays and Trilinos integration | 2 | |
|
325. | cognitive bias and critical thinking in open source intelligence osint benjamin br | 2 | |
|
326. | Building a self healing system with SaltStack | 2 | |
|
327. | Scanning IPv4 for Free Data and Free Shells Jordan Wright | 2 | |
|
328. | Tutorial my first hardware design Basic course to create a simple FPGA design using OSS tools | 2 | Tutorial |
|
329. | Designing functional objects with functional objects OpenSCAD Past, present and or future | 2 | |
|
330. | Hacker History This Stuff Matters Duncan Manuts | 2 | |
|
331. | Hacking BLE Bicycle Locks For Fun And A Small Profit Vincent Tan | 2 | |
|
332. | I Got 99 Trends And A Is All Of Them Steven Seeley and Roberto Suggi Liverani | 2 | |
|
333. | The FreeBSD Foundation and How We Are Changing the World | 2 | |
|
334. | BlueHat Seattle 2019 Kubernetes Practical Attack and Defense | 2 | |
|
335. | The hidden dangers inside the platform by Mickey Shkatov and Jesse Michael | 2 | |
|
336. | 24C3 2007 eng smartcard protocol sniffing high | 2 | |
|
337. | HOPE X A Conversation with Edward Snowden | 2 | |
|
338. | Hands on composition of basic L4Re components | 2 | |
|
339. | KDE on FreeBSD | 2 | |
|
340. | Quantum circuit optimisation, verification, and simulation with PyZX | 2 | |
|
341. | ActivityPub panel | 2 | |
|
342. | 30C3 2013 eng FPGA 101 | 2 | |
|
343. | Ian Coldwater Hello World | 2 | |
|
344. | The Conficker Mystery Mikko Hypponen | 2 | |
|
345. | Paul Sebastian Ziegler Hacking in The Far East | 2 | |
|
346. | 36C3 ChaosWest X11 and Wayland A tale of two implementations | 2 | |
|
347. | OpenDHT make your project distributed Use cases, new and upcoming features | 2 | |
|
348. | Asyncio understanding async and await in Python | 2 | |
|
349. | Cracking the Craptcha Gustavo Scotti | 2 | |
|
350. | Hackers On Planet Earth 1994 The 2600 Panel | 2 | |
|
351. | Hunting PBX for Vulnerabilities | 2 | |
|
352. | illumos SmartOS, specialized Type 1 Hypervisor | 2 | |
|
353. | Hannes Mehnert MirageOS Robust operation system design from the grounds up | 2 | |
|
354. | Scala A Scalable Language | 2 | |
|
355. | Mike Schiffman The Need for an 802 11b Toolkit Black Hat - USA - 2002 | 2 | |
|
356. | Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets | 2 | |
|
357. | Carlos Sarraute & Javier Burroni Neural Networks | 2 | |
|
358. | FASTCash and INJX Pure How Threat Actors Use Public Standards for Financial Fraud | 2 | |
|
359. | Inside Cybercrime Groups Harvesting Active Directory for Fun Vitali Kremez | 2 | |
|
360. | Josef Šíma ANARCHY AS A CONSERVATIVE PROGRAM | 2 | |
|
361. | Detecting Malicious Files with YARA Rules as They Traverse the Network | 2 | Guide |
|
362. | Application of OSINT SOCMINT techniques for the detection and analysis of terrorist profiles Cyber | 2 | |
|
363. | How Ive Broken Every Threat Intel Platform Ive Ever Had And Settled on MISP | 2 | |
|
364. | Ruby for Pentesters Michael Tracy, Chris Rohlf, Eric Monti | 2 | |
|
365. | Idiomatic Rust Writing concise and elegant Rust code | 2 | |
|
366. | Debugging and tracing a production RabbitMQ node | 2 | |
|
367. | YunoHost | 2 | |
|
368. | 115 How to Social Engineer your way into your dream job Jason Blanchard DerbyCon 6 | 2 | Guide |
|
369. | 33C3 2016 Formal Verification of Verilog HDL with Yosys SMTBMC | 2 | Vlog |
|
370. | COMMSEC Fault Injection Attacks On Secure Boot Niek Timmers and Albert Spruyt | 2 | |
|
371. | OpSec for InfoSec Justin Nordine | 2 | |
|
372. | Build more secure apps by harnessing the power of OWASP SKF & ASVS on Kubernetes Farshad Abasi | 2 | |
|
373. | NFS Ganesha | 2 | |
|
374. | Gomobile Android development with Go | 2 | |
|
375. | Dr Boldizsar Bencsath What Makes the Analysis of Malware Like Duqu or Flame | 2 | |
|
376. | LOLBins Nothing to LOL about Oddvar Moe DerbyCon 8 | 2 | |
|
377. | Quantum Security and Cryptography You Are Probably Doing it Wrong | 2 | |
|
378. | Advanced Reconnaissance Framework Solray | 2 | |
|
379. | 507 Real World Attacks VS Check box Security Brent White Tim Roberts DerbyCon 6 | 2 | |
|
380. | The art of the windows kernel fuzz Guangming Liu | 2 | |
|
381. | 34C3 ChaosWest Honigdachs Podcast LIVE | 2 | |
|
382. | Our Favorite XSS Filters and How to Attack Them Eduardo Vela Nava, David Lindsay | 2 | Guide |
|
383. | The Eleventh HOPE 2016 Iridium Satellite Hacking | 2 | |
|
384. | DEF CON 8 V1Ru5 More Lock Picking | 2 | |
|
385. | The Shuttle Columbia Disaster Lessons That Were Not Learned Joel I love it when they call me | 2 | |
|
386. | Updates from the RISC V TEE Group Working on a Trusted Execution Environment spec for RISC V | 2 | Vlog |
|
387. | Uzbl A webbrowser which adheres to the unix philosophy | 2 | |
|
388. | AV1 Codec Update | 2 | Vlog |
|
389. | Electro optical Sound Eavesdropping Ben Nassi | 2 | |
|
390. | Behind the scenes of iOS and Mac Security | 2 | |
|
391. | Building Prototypes Dan Gelbart part 6 of 18 Coatings | 2 | |
|
392. | Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts | 2 | |
|
393. | NETCONF 20220725 1400 | 2 | |
|
394. | Building WebGPU with Rust The new foundation for graphics and compute | 2 | |
|
395. | State of the Art of DNS Security Bill Woodcock | 2 | |
|
396. | The Game of Cyber Chess Cyber Mayday & the Day After by Shamane Tan | 2 | |
|
397. | Microarchitectural Attacks and the Case of Meltdown and Spectre Daniel Gruss | 2 | |
|
398. | Multiplatform Kotlin Library Development | 2 | |
|
399. | Andrey Labunets and Egor Homakov OAuth 2 0 and the Road to XSS | 2 | |
|
400. | BlueHat IL 2020 Dmitry Vyukov syzkaller Adventures in Continuous Coverage guided Kernel Fuzzing | 2 | Guide |
|