1. | The Grugq OPSEC Because Jail is for wuftpd | 4,787 | |
|
2. | Jim Geovedi & Raditya Iryandi Hacking VSAT | 2,495 | |
|
3. | 4G LTE Man In The Middle Attacks With A Hacked Femtocell Xiaodong Zou | 2,166 | |
|
4. | Pacu Attack and Post Exploitation in AWS Spencer Gietzen | 1,816 | |
|
5. | Nikola Rasovic Mobile phone surveillance with BladeRF | 1,539 | |
|
6. | NFC Payments The Art Of Relay And Replay Attacks Salvador Mendoza | 1,282 | |
|
7. | The Bug Hunter's Methodology v4 Recon Edition by 0x0G | 1,092 | |
|
8. | ALEXANDER BARD Paradigmatics Exploring New Technological Freedoms to Crush the Old | 824 | Vlog |
|
9. | The forgotten interface Windows named pipes by GIL COHEN | 737 | |
|
10. | Open Source Backup from Bacula to Bareos | 701 | |
|
11. | GNUNet You Broke The Internet Let's Make A GNU One sva | 646 | |
|
12. | Rooting Samsung Q60T Smart TV Jérémie Boutoille and Vincent Fargues | 645 | |
|
13. | HOPE 2020 Keynote Jaron Lanier | 603 | |
|
14. | Introducing mediasoup A WebRTC SFU for Node js | 599 | |
|
15. | DPAPI and DPAPI NG Decrypting All Users' Secrets and PFX Passwords P Januskiewicz | 588 | |
|
16. | Uplift your Linux systems programming skills with systemd and D Bus Practical examples and best pra… | 576 | |
|
17. | It's The End Of The World As We Know It aka The New Internet Architecture | 574 | |
|
18. | Yjs A CRDT framework for shared editing Enable shared editing in every application | 553 | |
|
19. | The best of both worlds Static and dynamic typing in the Crystal programming language | 482 | |
|
20. | A New Era Of SSRF Exploiting Url Parsers Orange Tsai | 474 | |
|
21. | Building Prototypes Dan Gelbart part 10 of 18 Flexures | 459 | |
|
22. | 5 Reasons to Subscribe to All Hacking Cons today | 439 | |
|
23. | Fuzzing WinAFL | 425 | |
|
24. | Martin Armstrong The Forecaster at Hackmiami Conference 2016 | 423 | |
|
25. | LibrePCB Status Update The progress of LibrePCB within the last two years | 412 | Vlog |
|
26. | Extend Emacs in C or Other Languages | 410 | |
|
27. | God Mode Unlocked Hardware Backdoors In x86 CPUs Christopher Domas | 406 | |
|
28. | Zoz Ultimate Mobile OPSEC | 403 | |
|
29. | dqlite High availability SQLite An embeddable, distributed and fault tolerant SQL engine | 402 | |
|
30. | Ilfak Guilfanov Decompilers and Beyond | 384 | |
|
31. | Industrial Protocol Gateways A Deep Dive of Moxa MGate 5105 MB EIP | 379 | |
|
32. | Risk Assessment Optimisation With MONARC Fabien Mathey | 375 | |
|
33. | NFS Ganesha | 371 | |
|
34. | keynote 1 theo de raadt | 362 | |
|
35. | DuckDB An Embeddable Analytical Database | 350 | |
|
36. | Fuzzing The Windows Kernel Koh Yong Chuan | 331 | |
|
37. | Introduction to LibrePCB A new, powerful and intuitive EDA tool for everyone | 330 | |
|
38. | prompt toolkit two years later | 327 | |
|
39. | Joanna Rutkowska | 324 | |
|
40. | Redox OS A safety first microkernel developed in Rust | 312 | |
|
41. | IronPython OMFG M Salvati | 311 | |
|
42. | Justin Smith THE FUTURE OF SWISS PRIVATE BANKING MONERO | 301 | |
|
43. | Saving Nostalgia Modding an Old Z80 Computer Presented By Graham Sutherland | 295 | |
|
44. | Mikko Hypponen The Cyber Arms Race | 293 | |
|
45. | Reversing Cryptographic Primitives Using Quantum Computing Renaud Lifchitz | 280 | |
|
46. | Crypto for Pentesters Thomas Ptacek, Michael Tracy | 278 | |
|
47. | Juraj Karpis Bad Money | 278 | |
|
48. | Gentoo Hardened | 274 | |
|
49. | Len Sassaman Forensic Dead Ends | 266 | |
|
50. | Kris Kaspersky Remote Code Execution Through Intel CPU Bugs | 264 | |
|
51. | Future of Guix | 257 | |
|
52. | Rendering map data with Mapnik and Python | 256 | |
|
53. | DNS IMAP Prepositioning Attacks Bill Woodcock | 255 | |
|
54. | Christopher Domas The Future Of ReDynamic Binary Visualization DerbyCon 2 | 243 | |
|
55. | BloodHound Head to Tail Andy Robbins Rohan Vazarkar DerbyCon 9 | 240 | |
|
56. | What the Hell is Inside There Chris Tarnovsky | 240 | |
|
57. | BtleJuice the Bluetooth Smart Man In The Middle Framework Damien Cauquil | 238 | |
|
58. | Weblate Localize your project the developer way continously, flawlessly, community driven, and op… | 236 | |
|
59. | Pwnagotchi your new digital pet George Coldham ComfyCon AU 2020 Winter | 234 | |
|
60. | apache wicket | 230 | |
|
61. | Wireless Intrusion Detection Systems with the Raspberry Pi Chris J | 227 | |
|
62. | Muraena The Unexpected Phish Michele Orru and Giuseppe Trotta | 225 | |
|
63. | Using SELinux with container runtimes | 222 | |
|
64. | OSINT for Beginners | 217 | |
|
65. | Paul Sebastian Ziegler Hacking in The Far East | 217 | |
|
66. | Syslinux and the dynamic x86 boot process | 215 | |
|
67. | More Tricks for Defeating SSL Moxie Marlinspike Black Hat - USA - 2009 | 212 | |
|
68. | Twitter Streaming Graph with Gephi Visualising stream of Data | 211 | |
|
69. | HUGO TESO Sweet Tools O' Mine | 208 | |
|
70. | openEMS An Introduction and Overview Using an EM field solver to design antennas and PCBs | 206 | |
|
71. | Exploiting the iOS Kernel Stefan Esser | 206 | |
|
72. | A Captive Audience Jaime Cochran | 203 | |
|
73. | Mikko Hypponen Keynote | 200 | |
|
74. | Reversing GO Binaries With Ghidra Albert Zsigovits and Dorka Palotay | 198 | |
|
75. | Reverse Engineering Windows Malware 101 Workshop Amanda Rousseau Workshop | 197 | |
|
76. | Hacking with WebSockets | 195 | |
|
77. | JSTARK1809 Fuck Gun Control 9mm | 195 | |
|
78. | Subgraph OS Hardening a Linux Desktop David Mirza Ahmad | 195 | |
|
79. | Real Time Chat on the Web How to use XMPP and Converse js to integrate webchat into any website | 192 | Guide |
|
80. | Metaprogramming with Nim | 191 | |
|
81. | Using Gerrit Code Review in an open source project | 190 | Review |
|
82. | 10 cool things about Exherbo | 187 | |
|
83. | Sophail A Critical Analysis of Sophos Antivirus Tavis Ormandy | 184 | |
|
84. | Dan Tentler System Shock The Shodan Computer Search Engine | 182 | |
|
85. | VIRTUAL LAB D1 Signal Processing with GNURadio and SDRs Ateet Kumar | 176 | |
|
86. | Frank Rieger CRYPTOGRAPHY ALONE IS NOT ENOUGH | 175 | |
|
87. | Kyber and Post Quantum Crypto How does it work | 175 | |
|
88. | kdevelop | 171 | |
|
89. | Hugo Teso Aircraft Hacking Practical Aero Series | 169 | |
|
90. | 34C3 2017 Reverse engineering FPGAs | 168 | |
|
91. | Hackfest 2015 John McAfee presented The unconventional truth | 166 | |
|
92. | Rodrigo Rubira Branco Study of Malware Obfuscation Techniques | 165 | |
|
93. | Asterisk WebRTC frontier make client SIP Phone with sipML5 and Janus Gateway Analyzing a real proj | 165 | |
|
94. | Linux tracing with LTTng | 165 | |
|
95. | Creating GopherJS Apps with gRPC Web | 161 | |
|
96. | Replicating a VASCO DIGIPASS Token Instance DIGIPASS DEMO for Android 4 10 0 | 160 | |
|
97. | CB16 DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long | 156 | |
|
98. | Package management and creation in Gentoo Linux | 155 | |
|
99. | Getting Started with OpenDaylight | 154 | |
|
100. | The Conficker Mystery Mikko Hypponen | 154 | |
|