101. | Putting Your Mind to It Bug Bounties for 12 Months @zseano | 153 | |
|
102. | Hacking with Guile Or how I stopped worrying and learned to love the REPL | 152 | |
|
103. | Siemens Simatic S7 PLC Exploitation Dillon Beresford | 151 | |
|
104. | ActivityPub panel | 149 | |
|
105. | Usbguard | 148 | |
|
106. | Travis Goodspeed Nifty Tricks For ARM Firmware Reverse Engineering | 144 | |
|
107. | Smart Parking Meter Implementations, Globalism, and You Joe Grand, Jacob Appelbaum, Chris Tarnovsk | 141 | |
|
108. | Building a distro with musl libc Why and how Alpine Linux did it | 141 | |
|
109. | Regaining control of your smartphone with postmarketOS and Maemo Leste Status of Linux on the smart… | 140 | |
|
110. | Reloading Escoria Make point and click adventure games under Godot great again | 138 | | Day of the Tentacle
|
111. | End to end Analysis of Domain Generating Algorithm Malware Family | 137 | |
|
112. | GNUnet A network protocol stack for building secure, distributed, and privacy preserving applicati… | 136 | |
|
113. | Reverse Engineering WhatsApp Encryption for Chat Manipulation and More | 136 | |
|
114. | CB16 WireGuard Next Generation Abuse Resistant Kernel Network Tunnel by Jason Donenfeld | 136 | |
|
115. | Writing Network Drivers in High Level Languages How to write drivers in Rust, go, C , Swift, Haskel… | 135 | Guide |
|
116. | Keynote Failure is not an Option Philippe Biondi | 133 | |
|
117. | Gomobile Android development with Go | 132 | |
|
118. | Threat Hunting the macOS edition Megan Carney | 131 | |
|
119. | Claudio Guarnieri Cuckoo Sandbox Automated Malware Analysis | 130 | |
|
120. | COMMSEC Breaking Siemens SIMATIC S7 PLC Protection Mechanism Gao Jian | 129 | |
|
121. | JavaParser where should we head How to generate, transform, analyze, refactor Java code | 128 | Guide |
|
122. | Application of OSINT SOCMINT techniques for the detection and analysis of terrorist profiles Cyber | 128 | |
|
123. | QUANTUM HIGHLIGHT What Would A Quantum Computer Do To Crypto Najwa Aaraj | 128 | |
|
124. | Hannes Mehnert MirageOS what did we achieve in the last year | 127 | |
|
125. | SCCP Hacking, Attacking The SS7 & SIGTRAN Applications | 126 | |
|
126. | To the future with Grav CMS How we migrated from a Wiki to the open source Grav CMS | 124 | |
|
127. | Emmanuel Gadaix Something MEGA | 123 | |
|
128. | horizon EDA what's new | 123 | |
|
129. | Going mobile with React Native and WebRTC How Jitsi Meet went from web to mobile, while sharing mos… | 122 | |
|
130. | Jan K Rutkowski Advance Windows 2000 Rootkits Detection | 121 | |
|
131. | BtleJuice the Bluetooth Smart Man In The Middle Framework by Damiel Cauquil | 120 | |
|
132. | naxsi, an open source web application firewall for nginx | 120 | |
|
133. | IOT Security Hack The Damn Vulnerable IoT Device Arnaud Courty | 120 | |
|
134. | Introducing ARM X The ARM IoT Firmware Emulation Framework Saumil Shah | 118 | |
|
135. | Ridiculous Radios Michael Ossmann | 118 | |
|
136. | Look at ME Intel ME firmware investigation | 116 | |
|
137. | Bareos Backup Archiving REcovery Open Sourced Overview | 116 | |
|
138. | HOPE 2020 Sex Work as Artistic Practice | 116 | |
|
139. | Async await in Nim A demonstration of the flexibility metaprogramming can bring to a language | 116 | |
|
140. | Virtual Lab Firmware Hacking With Ghidra Thomas Roth & Dmitry Nedospasov | 116 | |
|
141. | IronPython omfg Marcello Salvati DerbyCon 8 | 115 | |
|
142. | Andreas Antonopoulos Tsunami of Innovation | 114 | |
|
143. | Julian Ho MoocherHunting Real Time Geo Location Unauthorized WiFi Users | 113 | |
|
144. | OpenWISP2 a self hosted solution to control OpenWRT LEDE devices | 112 | |
|
145. | Reviving Smart Card Analysis Karsten Nohl, Chris Tarnovsky | 112 | |
|
146. | Building High Performance Web Applications with the Dojo Toolkit | 110 | |
|
147. | 0 A D Graphics Pipeline How open source game graphics works | 109 | |
|
148. | A microkernel written in Rust Porting the UNIX like Redox OS to Armv8 A case study of Rust as a la | 108 | |
|
149. | Fedora on RISC V 64 bit Introduction, Brief Overview and Latest Developments | 107 | |
|
150. | An overview of Sozi | 107 | |
|
151. | A Death in Athens The inherent Vulnerability of Lawful Intercept Programs James Bamford DeepSec 2 | 106 | |
|
152. | ARMv8, ARM's new architecture including 64 bit | 105 | |
|
153. | Halvar Flake Keynote | 105 | |
|
154. | Hannes Mehnert MirageOS Robust operation system design from the grounds up | 105 | |
|
155. | Roberto Preatoni & Fabio Ghioni The Biggest Brother | 105 | |
|
156. | Open CASCADE Technology an introduction and overview | 105 | |
|
157. | Write and Submit your first Linux kernel Patch | 105 | |
|
158. | Stegosploit Drive by Browser Exploits using only Images Presented By Saumil Shah | 104 | |
|
159. | Dissecting media file formats with Kaitai Struct | 103 | |
|
160. | Back to the Linux Framebuffer Linux Framebuffer support in free software | 103 | |
|
161. | A 2018 practical guide to hacking RFID NFC Sławomir Jasek | 100 | Guide |
|
162. | Samy Kamkar The Less Hacked Path | 100 | |
|
163. | OPSEC for hackers | 99 | |
|
164. | IDA and Malware Reverse Eng 101 by Jake Williams | 98 | |
|
165. | Introduction to Reactive Programming with RxPY | 98 | |
|
166. | Troels Henriksen Futhark A data parallel pure functional programming language com | 96 | |
|
167. | IPFIRE The Open Source Firewall Distribution | 96 | |
|
168. | 36C3 ChaosWest X11 and Wayland A tale of two implementations | 95 | |
|
169. | AV1 Codec Update | 95 | Vlog |
|
170. | MINIX 3 on ARM | 95 | |
|
171. | The Skulls project coreboot your Laptop The easy way | 94 | |
|
172. | JsSIP SIP in your browser | 94 | |
|
173. | Backslash Powered Scanning Hunting Unknown Vulnerability Classes | 94 | |
|
174. | LumoSQL Experiments with SQLite, LMDB and more SQLite is justly famous, but also has well known l… | 94 | |
|
175. | Graphing Out Internal Networks with CVE 2020 13379 Unauthed Grafana SSRF | 93 | |
|
176. | Modlishka Is a Mantis Eating 2FAs Lunch Lance Peterman DerbyCon 9 | 93 | |
|
177. | Designing an ultra low overhead multithreading runtime for Nim Exposing fine grained parallelism fo… | 93 | |
|
178. | The Building Security In Maturity Model BSIMM | 93 | Guide |
|
179. | Brida When Burp Suite meets Frida Federico Dotta & Piergiovanni Cipolloni | 92 | |
|
180. | GeoNetwork Basics | 92 | |
|
181. | Forging The USB Armory, An Open Source Secure Flash Drive Sized Computer | 91 | |
|
182. | Kolab Groupware | 91 | |
|
183. | How to Hack Medical Imaging Applications via DICOM Maria Nedyak | 91 | |
|
184. | AM Keynote by Mikko Hypponen AusCERT 2019 | 91 | |
|
185. | FreeBSD Insecure by default | 91 | |
|
186. | sled and rio modern database engineering with io uring | 90 | |
|
187. | 312 Using Binary Ninja for Modern Malware Analysis Dr Jared DeMott Mr Josh Stroschein DerbyCon 6 | 90 | |
|
188. | HITB LAB ARM IoT Firmware Extraction And Emulation Using ARMX Saumil Shah | 89 | |
|
189. | BlueHat IL 2018 David Weston Windows Hardening with Hardware | 89 | |
|
190. | Unlocking Secrets Of The Proxmark3 RDV4 0 Christian Herrmann And Kevin Barker Black Alps 2018 | 89 | Let's Play |
|
191. | KEYNOTE 2 Cyber Arms Race Mikko Hypponen | 89 | |
|
192. | Daniel Krawisz HOW TO NAP THE MOST | 89 | Guide |
|
193. | nextcloud Cloud Federation sync, share & collaborate in a decentralized cloud | 88 | |
|
194. | Moulay Hafid El Alamy Opening Ceremony ICANN55 | 88 | |
|
195. | Weblate open source continuous localization platform How to bring your project closer to its users… | 88 | |
|
196. | Cloudburst Hacking 3D and Breaking Out of VMware Kostya Kortchinsky Black Hat - USA - 2009 | 88 | |
|
197. | CTF Attack defense 101 Tools and exploits explained | 86 | |
|
198. | Embedded FreeBSD on a five core RISC V processor using LLVM How hard can it be | 86 | |
|
199. | Libreboot Free your BIOS today | 85 | |
|
200. | Introducing rust prometheus How Rust makes metrics safe and fast | 85 | |
|