401. | HOPE 2020 Sex Work as Artistic Practice | 2 | |
|
402. | Intro to Powershell Scripting for Security Brandon Morris | 2 | |
|
403. | Build more secure apps by harnessing the power of OWASP SKF & ASVS on Kubernetes Farshad Abasi | 2 | |
|
404. | 115 How to Social Engineer your way into your dream job Jason Blanchard DerbyCon 6 | 2 | Guide |
|
405. | LT frederic marmond REVEN Axion Talk | 2 | |
|
406. | Dr Boldizsar Bencsath What Makes the Analysis of Malware Like Duqu or Flame | 2 | |
|
407. | Quantum Security and Cryptography You Are Probably Doing it Wrong | 2 | |
|
408. | OpSec for InfoSec Justin Nordine | 2 | |
|
409. | Gomobile Android development with Go | 2 | |
|
410. | The art of the windows kernel fuzz Guangming Liu | 2 | |
|
411. | WHcking Kung FU | 1 | |
|
412. | openEMS An Introduction and Overview Using an EM field solver to design antennas and PCBs | 1 | |
|
413. | Porting Debian to the RISC V architecture Tales from a long quest | 1 | |
|
414. | Nathan Chung Neurodiversity in Cybersecurity | 1 | |
|
415. | How To Defeat EDRs In Usermode Alessandro Magnosi & Jean Francois Maes | 1 | |
|
416. | Chris Davis & Chris Elgee, HTTP2 Because 1 is the Loneliest Number | 1 | |
|
417. | CBOR 20180717 1330 | 1 | |
|
418. | Introduction to LXD clustering Multi node deployments with one big virtual LXD | 1 | |
|
419. | Testing web applications with traffic control in containers | 1 | |
|
420. | 30C3 2013 eng deu Persistent Stealthy Remote controlled Dedicated Hardware Malware | 1 | |
|
421. | From Zero to Hero Journey of vulnerability Identification and Disclosure | 1 | |
|
422. | Between You and Me and the Network Security Boundary Patrick Fussell | 1 | |
|
423. | A 16 bit Rootkit and Second Generation Zigbee Chips Travis Goodspeed | 1 | |
|
424. | Jonathan Squire A Fox in the Hen House UPnP IGD | 1 | |
|
425. | Breaches Are Everywhere What's A Good Security Leader To Do Richard Greenberg | 1 | |
|
426. | Ed25519 Signature Schemes Theory and Practice | 1 | |
|
427. | Building Prototypes Dan Gelbart part 17 of 18 High Accuracy | 1 | |
|
428. | Typescript =❯ IL =❯ Game Modding Supercharged | 1 | |
|
429. | Modlishka Is a Mantis Eating 2FAs Lunch Lance Peterman DerbyCon 9 | 1 | |
|
430. | Old Tools New Tricks Hacking WebSockets Michael Fowl Nick Defoe DerbyCon 9 | 1 | |
|
431. | Cyber Security Threats to Telecom Networks by Hardik Mehta | 1 | |
|
432. | Keynote speaker Darren Kitchen, Hak5 | 1 | |
|
433. | Dmitri Alperovitch | 1 | |
|
434. | TLS 20210728 1900 | 1 | |
|
435. | Bypassing Secure Boot Using Fault Injection | 1 | |
|
436. | Elasticsearch REvolution You Know, for Search | 1 | |
|
437. | x 91 | 1 | |
|
438. | Bypassing Clang's SafeStack for Fun and Profit Black Hat - Europe - 2016 | 1 | |
|
439. | Marina Krotofil Rocking the pocket book hacking chemical plant for competition and extortion | 1 | |
|
440. | Beyond HOPE 1997 GSM Phones and the Future | 1 | |
|
441. | Monday Lightning Talks | 1 | |
|
442. | TRILL 20170721 1150 | 1 | |
|
443. | V Vorontsov and A Golovko SSRF PWNs New Techniques and Stories | 1 | |
|
444. | A Heaven for Hackers Breaking a Web Security Virtual Appliances by Mehmet INCE | 1 | |
|
445. | Cyber Operations vs Information Operations Twilight Talk CyCon NATO 2019 | 1 | Guide |
|
446. | DevSecCon Boston 2017 Highlights | 1 | |
|
447. | Beyond the webrtc org monoculture Alternative WebRTC implementations in C and Python | 1 | |
|
448. | 25C3 2008 eng terrorist all stars | 1 | |
|
449. | Scott Blake Politics of Vulnerabilities | 1 | |
|
450. | Mining Anomalies in Network Wide Flow Data | 1 | |
|
451. | A Comparative Usability Study of FIDO2 Passwordless Authentication | 1 | |
|
452. | 48 Dirty Little Secrets Cryptographers Don't Want You To Know | 1 | |
|
453. | Open Source Support for TTML Subtitles Status Quo and Outlook | 1 | |
|
454. | RFID Chip Inside the Body Reflecting the Current State of Usage, Triggers, and Ethical Issues DeepS | 1 | |
|
455. | 33C3 2016 CCC JahresrUckblick 2016 | 1 | |
|
456. | AXIOM open source cinema camera Project Introduction and current state of development | 1 | |
|
457. | Rodrigo Branco Computer Arch H2HC University | 1 | |
|
458. | Living Off The Land A Minimalist S Guide To Windows Post Exploitation Christopher Campbell Matthew G | 1 | Guide |
|
459. | Lessons learned from porting HelenOS to RISC V Pros and cons of RISC V from a microkernel OS point … | 1 | |
|
460. | WiCy Monitoring 802 11AC Networks At Scale Vivek Ramachandran | 1 | |
|
461. | Creating A Fuzzer For Diameter And LTE Telecom Protocols Sergey Mashukov | 1 | |
|
462. | LISP 20161116 0930 | 1 | |
|
463. | HATS Catch up with Ero Carrera and Sergey Lozhkin | 1 | |
|
464. | Technological Changes that Affect Forensic Investigations Diane Barrett BloomCon - 2017 | 1 | Vlog |
|
465. | Defense in Depth Techniques for Modern Web Apps M Spagnuolo & L Weichselbaum | 1 | |
|
466. | m101 Exploitation in a hostile world FR | 1 | |
|
467. | KEYNOTE 2 The State Of Mobile Security Zuk Avraham | 1 | |
|
468. | All Your Database Are Belong To Us @spaceraccoon | 1 | |
|
469. | HOPE X Keynote Address Daniel Ellsberg | 1 | |
|
470. | BlueHat v18 First STRONTIUM UEFI Rootkit Unveiled | 1 | |
|
471. | RMCAT 20161117 1520 | 1 | |
|
472. | nextcloud Cloud Federation sync, share & collaborate in a decentralized cloud | 1 | |
|
473. | Browser bug hunting Memoirs of a last man standing Atte Kettunen | 1 | |
|
474. | Building Prototypes Dan Gelbart part 15 of 18 Mill and Lathe | 1 | |
|
475. | Go Purple Adopt purple team strategy to augment Application Security Programs Trupti Shiralkar | 1 | |
|
476. | Noob 101 Practical Techniques for AV Bypass Jared Hoffman | 1 | |
|
477. | Scapy in 15 minutes Guillaume Valadon | 1 | |
|
478. | The year of the virtual Linux desktop | 1 | |
|
479. | How Containers Contain z0rro | 1 | |
|
480. | Mobile App Pentesting en Primera Persona | 1 | |
|
481. | DEF CON 7 Peter Shipley Intro To TCPIP | 1 | |
|
482. | part2 Design and Build a 2 MeV Cyclotron | 1 | |
|
483. | The Eleventh HOPE 2016 The Phuture of Phreaking | 1 | |
|
484. | Aluc Possible effects from electromagnetic pollution of micro and millimeter waves | 1 | |
|
485. | RTGWG 20181105 1610 | 1 | |
|
486. | TCPM 20170329 0900 | 1 | |
|
487. | Threat Modeling 101 Viss | 1 | |
|
488. | Hacking Medical Devices And Healthcare Infrastructure Anirudh Duggal | 1 | |
|
489. | CDNI 20160407 1400 | 1 | |
|
490. | Self hosted server backups for the paranoid Using Borg, SSH, Python and FreeNAS to securely backup … | 1 | |
|
491. | Tying software deployment to scientific workflows Using Guix to make software deployment a first cl… | 1 | |
|
492. | Managing 100 million IP addresses | 1 | |
|
493. | Matt Denton Animatronics And Robots In The Movies | 1 | |
|
494. | Play CTF A Great Way To Learn Hacking By LiveOverflow | 1 | |
|
495. | Kuza55 Implementing a Blind TCPIP Hijacking Tool | 1 | |
|
496. | gobpf utilizing eBPF from Go | 1 | |
|
497. | A Fuzzy Kind of HITB Armory with Matteo Beccaro and Rocco Calvi | 1 | |
|
498. | Jean Philippe Aumasson Blockchain the top 10 security disasters | 1 | |
|
499. | Real World Threat Intelligence Elle Armageddon | 1 | |
|
500. | Joe Sarkisian JUST JUMP Lessons for Wannabe Social Engineers | 1 | |
|