201. | Libreboot Free your BIOS today | 85 | |
|
202. | Windows kernel snapshot based fuzzing the good, the bad and the ugly Damien Aumaitre | 84 | |
|
203. | Benefits of porting Godot Engine to Vulkan List of benefits observed from porting Godot Engine to V… | 84 | |
|
204. | Jitsi Videobridge and WebRTC | 84 | |
|
205. | RetDec An Open Source Machine Code Decompiler Jakub Kroustek, Peter Matula | 84 | |
|
206. | David Bianco The Pyramid of Pain | 84 | |
|
207. | 33C3 2016 Shining some light on the Amazon Dash button | 84 | |
|
208. | Embedded Sailfishos | 84 | |
|
209. | MIKKO HYPPONEN World War I | 84 | |
|
210. | Mikko Hypponen Memoirs of a Data Security Fighter | 83 | |
|
211. | Sarup Banskota Digging within git | 83 | |
|
212. | Bart Meijer Home Automation with OpenHAB and KNX | 83 | |
|
213. | WebAssembly A New World of Native Exploits on the Browser | 83 | |
|
214. | NetBSD A modern operating system for your retro battlestation | 83 | |
|
215. | Fast Packet Processing in Linux with AF XDP | 82 | |
|
216. | AtlSecCon 2019 Opening Keynote Cliff Stoll | 82 | |
|
217. | 802 1x Network access control & Bypass Techniques by VALERIAN LEGRAND | 82 | |
|
218. | Grafanalib Dashboards as Code | 82 | |
|
219. | 郭璟塘 AZ 看我如何搭配黑帽SEO玩轉網站排名流量 | 82 | |
|
220. | The future of Authenticity Moxie Marlinspike | 81 | |
|
221. | 23C3 2006 eng culture jamming discordianism | 81 | |
|
222. | What We Learned Developing The Prosody Xmpp Server In Lu | 81 | |
|
223. | Python for Godot | 80 | |
|
224. | SWIM Protocol to Build a Cluster SWIM gossip protocol, its implementation, and improvements | 80 | |
|
225. | DOSEMU and FreeDOS past, present and future | 79 | |
|
226. | Foreman meets Ansible | 79 | |
|
227. | The Sum Of All Fears, When ICS SCADA Are Compromised Mars Cheng | 79 | | The Sum of All Fears
|
228. | Attacking Intel Bios Rafal Wojtczuk, Alexander Tereshkin Black Hat - USA - 2009 | 79 | |
|
229. | EPUB export in LibreOffice Writer | 78 | |
|
230. | Bash Scripting for Pentesters by Lee Baird | 78 | |
|
231. | BitCracker BitLocker Meets GPUs DeepSec 2017 | 78 | |
|
232. | Emulating IoT firmware en masse with Docker & QEMU Ilya | 78 | |
|
233. | CB18 Keynote Cyber Arms Race by Mikko Hyppönen | 77 | |
|
234. | dav1d 1 year later dav1d is a fast AV1 decoder | 77 | |
|
235. | Darshak how to turn your phone into a low cost IMSI catcher device Ravishankar Borgaonkar and Swap | 77 | Guide |
|
236. | Horizon EDA Version 1 0 | 77 | |
|
237. | Exploiting The Netlogon Protocol Tom Tervoort | 77 | |
|
238. | Barnaby Jack Kernel Exploitation Black Hat - USA - 2005 | 76 | |
|
239. | Akos Maroy, Tamas Bodoky Anonim whistleblowing using the GlobaLeaks platform | 76 | |
|
240. | OpenBSD as house alarm system Openbsd is not only good for network related projects | 76 | |
|
241. | Simulating noisy quantum devices with QuTiP | 76 | |
|
242. | Nikita Tarakanov Exploiting Hardcore Pool Corruptions in MS Windows Kernel | 75 | | Hardcore Pool
|
243. | Hacking on Bug Bounties for Five Years @infosec au | 75 | |
|
244. | Biometric Authentication Under Threat Liveness Detection Hacking | 75 | |
|
245. | 00 The MoVfuscator Turning mov into a soul crushing RE nightmare Christopher Domas DerbyCon 5 | 75 | |
|
246. | Joanna Rutkowska Subverting Vista Kernel for Fun | 74 | |
|
247. | Universal package & service discovery with Guix Α universal functional package manager and operatin… | 74 | |
|
248. | Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets | 74 | |
|
249. | Lightning Talk iOS Forensics by Pasquale Stirparo | 74 | |
|
250. | Mozilla's DeepSpeech and Common Voice projects Open and offline capable voice recognition for every… | 73 | |
|
251. | Teresa Rothaar What Is a Cybersecurity Copywriter, Anyway | 73 | |
|
252. | Fyodor Yarochkin and The Grugq From Russia With Love exe | 73 | |
|
253. | I Got 99 Trends And A Is All Of Them Steven Seeley and Roberto Suggi Liverani | 73 | |
|
254. | WiFi Based IMSI Catcher Black Hat - Europe - 2016 | 73 | |
|
255. | 211 Introducing DeepBlueCLI a PowerShell module for hunt teaming via Windows event logs Eric Conrad | 72 | Vlog |
|
256. | Maithreyi Seetharaman Presents Sustainability & Global Economy Stream | 72 | |
|
257. | My quest into FM RDS, Oona Raisanen | 71 | |
|
258. | virtio fs A shared file system for virtual machines | 71 | |
|
259. | Genode as general purpose OS progress report and demonstration | 71 | |
|
260. | SimulaQron a simulator for developing quantum internet software | 71 | |
|
261. | Effective Threat Hunting w Open Source Tools Eric Capuano | 70 | |
|
262. | CommSec PyREBox Making Dynamic Instrumentation Great Again X Ugarte Pedrero | 70 | |
|
263. | kota kanbe & Teppei Fukuda Automating vulnerability scanning with Vuls | 70 | |
|
264. | Scout Suite A Multi Cloud Security Auditing Tool Xavier Garceau Aranda | 70 | |
|
265. | JAIME PEÑALBA The Worst Bug Bounty Ever DIA 2 | 70 | |
|
266. | Building Prototypes Dan Gelbart part 14 of 18 Brazing | 70 | |
|
267. | Reuben Paul's Closing Keynote | 69 | |
|
268. | Philippe Biondi & Arnaud Ebalard Scapy and IPv6 | 69 | |
|
269. | 30C3 2013 eng Attacking HomeMatic | 69 | |
|
270. | SPECIAL CLOSING Rop Gonggrijp | 69 | |
|
271. | Easy Local Windows Kernel Exploitation | 68 | |
|
272. | Mobile Network Hacking, All over IP Edition Luca Melette, Sina Yazdanmehr DeepSec 2019 | 68 | |
|
273. | Clobbering the Cloud Haroon Meer, Nick Arvanitis, Marco Slaviero | 67 | |
|
274. | DTrace OS X = Fun Andrzej Dyjak | 67 | |
|
275. | Building Prototypes Dan Gelbart part 9 of 18 Materials | 67 | |
|
276. | NixOS, a functional GNU Linux distro | 67 | |
|
277. | Practical OSINT Tools of the trade Tom Moore | 67 | |
|
278. | Cloning 3G4G SIM Cards With A PC And An Oscilloscope Lessons Learned | 67 | |
|
279. | Idiomatic Rust Writing concise and elegant Rust code | 67 | |
|
280. | In Depth Analysis Of Multicast DNS And DNS Service Discovery Antonios Atlasis | 67 | |
|
281. | Ian Tabor Value pasta auto how I built it and saved $28000 | 67 | |
|
282. | Building a Multi Node SIP Platform Using OpenSIPS Cluster multiple OpenSIPS nodes to create a highl… | 66 | |
|
283. | Quantum Security and Cryptography You Are Probably Doing it Wrong | 66 | |
|
284. | Michael Ossmann My Ubertooth Year | 65 | |
|
285. | OSINT e Ingenieria Social como vectores de ataque a la ciberseguridad CyberCamp 2019 | 65 | |
|
286. | Privacy with Cryptomator End to end cloud by Christian Schmickler and Markus Kreusch | 65 | |
|
287. | Inside Stegosploit DeepSec 2016 | 65 | |
|
288. | Improving dm crypt performance for XTS AES mode Levent Demir | 65 | |
|
289. | Discussing If Blaire Whites Video was Fake w Hunter Avallone, Blaire White and NoBS DerbyCon 7 | 65 | |
|
290. | An Update on NetBSD and pkgsrc | 64 | Vlog |
|
291. | GRIMMCon 0X2 Experts Sherrod DeGrippo Threat Actor Galaxy Brain | 64 | |
|
292. | 101 Key Note Jeffrey Snover Lee Holmes DerbyCon 6 | 64 | |
|
293. | Dragonblood: Attacking the Dragonfly Handshake of WPA3 | 64 | |
|
294. | Everything is connected How to hack Bank Account using Instagram DeepSec 2018 | 64 | Guide |
|
295. | Pushing the limits of the Web with WebAssembly | 63 | |
|
296. | Vis Editor Combining modal editing with structural regular expressions | 63 | |
|
297. | Reproducible packaging and distribution of software with GNU Guix Distributing software with Guix | 63 | |
|
298. | Solving Polynomial Systems in Python phcpy a scripting interface for PHCpack | 63 | |
|
299. | Collabora Office on iOS | 63 | |
|
300. | zeroconf | 63 | |
|