301. | 03 Red vs Blue Modern Active Directory Attacks Defense Sean Metcalf DerbyCon 5 | 62 | |
|
302. | Travis Goodspeed Nifty Tricks for ARM Firmware Reverse Engineering | 62 | |
|
303. | Borja Berástegui Handware Hacking If no input no danger | 62 | |
|
304. | Marc Van Hauser Heuse IPv6 Insecurity Revolutions | 62 | |
|
305. | ModJack Hijacking The MacOS Kernel Zhi Zhou | 62 | |
|
306. | Poul Henning Kamp News from the ESO ELT telescope & The new NerdHouse | 61 | |
|
307. | I Own Your Building Management System Gjoko Krstic | 61 | |
|
308. | CB14 Keren Elazari Keynote The 5 biggest problems of cyber security | 61 | |
|
309. | Discover vulnerabilities with CodeQL | 61 | |
|
310. | Easy mobile penetration testing with Brida Federico Dotta & Piergiovanni Cipolloni | 61 | |
|
311. | From table to index and back with Hibernate Search 6 Leveraging Elasticsearch's power with a rela… | 61 | |
|
312. | There's a party at ring0 Tavis Ormandy, Julien Tinnes | 61 | |
|
313. | Exploit generation and JavaScript analysis automation with WinDBG | 60 | |
|
314. | LTE & IMSI Catcher Myths Black Hat - Europe - 2015 | 60 | |
|
315. | Malware Buried Deep Down the SPI Flash Sednit's First UEFI Rootkit Found in the Wild | 60 | |
|
316. | Building WebGPU with Rust The new foundation for graphics and compute | 60 | |
|
317. | GRIMMCon 0x2 Experts John Hammond & Caleb Stewart Pwncat | 60 | |
|
318. | Drawing PCBs with Inkscape Creating printed circuit board designs using Inkscape, SVG2Shenzhen and … | 60 | |
|
319. | Rahul Sasi CXML VXML IVR Pentesting for Auditors | 60 | |
|
320. | JAIME PEÑALBA The Worst Bug Bounty Ever DIA 2 | 60 | |
|
321. | Apt Xapian Index Enrico Zini | 60 | |
|
322. | Splinter the rat attack create your own botnet to exploit the network | 60 | |
|
323. | Upspin and a future of the Internet My vision of Rob Pike's Upspin as a basis for a decentralized I… | 59 | |
|
324. | Yet another passive RADAR using DVB T receiver and SDR | 59 | |
|
325. | Using the techniques of propaganda to instil a culture of security Justin Rogosky | 59 | |
|
326. | Travis Goodspeed Polyglots in Amateur Radio | 59 | |
|
327. | Grugq Meta Anti Forensics The Hash Hacking Harness | 59 | |
|
328. | Rspamd integration into FreeBSD org mail infrastructure | 59 | |
|
329. | FreeRTOS on RISC V Running the FreeRTOS kernel in RISC V emulators and RISC V hardware | 59 | |
|
330. | Kelly Shortridge, Know Thyself Optimizing Team Decision Making | 59 | |
|
331. | Is Attestation All We Need Fooling Apple’s AppAttest API Igor Lyrchikov | 59 | |
|
332. | Introducing Ring 3 Rootkits Alexander Tereshkin & Rafal Wojtczuk Black Hat - USA - 2009 | 58 | |
|
333. | Keynote What BASE Jumping Taught Me about Risk Shyama Rose | 58 | |
|
334. | Biohacking Village | 58 | |
|
335. | TPM2 0 practical usage Using a firmware TPM 2 0 on an embedded device | 58 | |
|
336. | Voja Antonic Hacking before computers | 58 | |
|
337. | KDE on FreeBSD | 58 | |
|
338. | KEYNOTE 3 Mark Phiber Optik Abene | 58 | |
|
339. | Quantum Computing at Google and in the Cloud An update on Google's quantum computing program and it… | 58 | Vlog |
|
340. | Raoul Chiesa Hacker's Profiling Project HPP | 58 | |
|
341. | m r Mane Piperevski Methodology for Vulnerability Research and Exploit Development | 58 | Vlog |
|
342. | Arjen Kamphuis Introduction To Information Security And Privacy | 58 | Guide |
|
343. | Simon Munnery Adventures In Undertent Heating | 58 | |
|
344. | Mane Piperevski Hacking attacks | 57 | |
|
345. | Onion adventures how to use onion services and the Tor network in your web endeavors | 57 | Guide |
|
346. | Ruby for Pentesters Michael Tracy, Chris Rohlf, Eric Monti | 57 | |
|
347. | Mikko H Hypponen Keynote Where are we and Where are we Going | 57 | |
|
348. | Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD) | 57 | |
|
349. | Building Prototypes Dan Gelbart part 15 of 18 Mill and Lathe | 57 | |
|
350. | Mischa Peters The OpenBSD Hypervisor in the wild | 57 | |
|
351. | Steven Seeley Ghost in the Windows 7 Allocator | 57 | |
|
352. | KEYNOTE 2 Bruce Schneier Trust Security and Society | 56 | |
|
353. | Gen Retired Keith Alexander CEO, IronNet Cybersecurity CyCon US 2017 | 56 | |
|
354. | High performance and scaling techniques in Golang using Go Assembly | 56 | |
|
355. | git annex manage files with git, without checking their contents into git | 56 | |
|
356. | Windows Rootkit Development Python prototyping to kernel level C2 RJ McDown DerbyCon 7 | 56 | |
|
357. | Giacomo Zucco BITCOIN POLITICAL ATTACK VECTORS AND COMMON MISCONCEPTIONS | 56 | |
|
358. | Hiding Malware Payloads With Autoit By Vanja Svajcer | 56 | |
|
359. | 26C3 2009 eng conlanging 101 | 56 | |
|
360. | Stoned Bootkit Peter Kleissner Black Hat - USA - 2009 | 56 | |
|
361. | Hidden Agendas Bypassing GSMA Recommendations On SS7 Networks Kirill Puzankov | 55 | |
|
362. | Passbolt Open source password manager for teams | 55 | |
|
363. | Writing a functional DPDK application from scratch | 55 | |
|
364. | Inside Monero The world's first fungible cryptocurrency | 55 | |
|
365. | SHADOWPAD Chinese Espionage Malware as a Service Yi Jhen Hsieh & Joey Chen | 55 | |
|
366. | 33C3 2016 SpinalHDL An alternative hardware description language | 55 | |
|
367. | openSUSE KDE | 55 | |
|
368. | Apache DataSketches A Production Quality Sketching Library for the Analysis of Big Data | 54 | |
|
369. | Forth The New Synthesis Growing Forth with preForth and seedForth | 54 | |
|
370. | DAVID FRIEDMAN Anarchy Online A World of Strong Privacy | 54 | |
|
371. | Key Reinstallation Attacks Breaking the WPA2 Protocol Black Hat - Europe - 2017 | 54 | |
|
372. | Overcoming Fear Reversing With Radare2 Arnau Gamez Montolio | 54 | |
|
373. | Maemo Leste A Debian Devuan based mobile hacker OS | 54 | |
|
374. | Phishing Frenzy 7 Seconds From Hook To Sinker Brandon Zeknox Mccann DerbyCon 3 | 54 | |
|
375. | Crostini A Linux Desktop on ChromeOS | 54 | |
|
376. | How To Dump, Parse, And Analyze i MX Flash Memory Chips Damien Cauquil | 54 | |
|
377. | Building Prototypes Dan Gelbart part 3 of 18 Waterjet | 54 | |
|
378. | SSL And The Future of Authenticity Moxie Marlinspike | 54 | |
|
379. | Nim on everything From microcontrollers to web sites, C and JS as intermediary languages | 53 | |
|
380. | Itzhak Avraham and Nir Goldshlager Killing a Bug Bounty Program TWICE | 53 | |
|
381. | FASTCash and INJX Pure How Threat Actors Use Public Standards for Financial Fraud | 53 | |
|
382. | The Pentester Blueprint A Guide to Becoming a Pentester | 53 | |
|
383. | BlueHat IL 2019 Luca Todesco @qwertyoruiop Life as an iOS Attacker | 53 | |
|
384. | Jérémie Zimmermann Hacking with Care | 53 | |
|
385. | Fearless Multimedia Programming using GStreamer & Rust | 53 | |
|
386. | Gattacking Bluetooth Smart Devices Introducing a New BLE Proxy Tool | 53 | |
|
387. | Catching the CAN Bus Car Hacking on a Budget | 53 | |
|
388. | How to hack on Wikipedia | 53 | Guide |
|
389. | A roadmap for the Hurd | 53 | |
|
390. | CLOSING KEYNOTE Richard Thieme Conspiracy Theories, Counter Intelligence & K | 52 | |
|
391. | golang, practical Go Programming | 52 | |
|
392. | Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware | 52 | |
|
393. | Hackers Do we shoot or do we hug by EDWIN VAN ANDEL | 52 | |
|
394. | 19C3 2002 symbolics lisp machines | 52 | |
|
395. | Smart Sheriff, Dumb Idea Abraham Aranguren & Fabian Fässler | 52 | |
|
396. | Car Hacking Practical Guide To Automotive Security Yogesh Ojha | 52 | |
|
397. | YunoHost | 52 | |
|
398. | BSD from scratch from source to OS with ease on NetBSD | 51 | |
|
399. | Wait How Is All This Stuff Free Gene Bransfield DerbyCon 3 | 51 | |
|
400. | Unicorn Next Generation CPU Emulator Framework | 51 | |
|