401. | Unicorn Next Generation CPU Emulator Framework | 51 | |
|
402. | IntelMQ Sebastian Wagner DeepSec 2015 | 51 | |
|
403. | Understanding Linux Malware | 51 | |
|
404. | Alire Ada Has a Package Manager | 51 | |
|
405. | M 'etamorphose univ nantes fr Rémi Lehn | 51 | |
|
406. | Bruce Schneier Keynote | 51 | |
|
407. | Purely Functional GPU Programming with Futhark | 51 | |
|
408. | CommSec Threat Hunting 101 Become The Hunter Hamza Beghal | 51 | |
|
409. | Black Hat USA 1999 Bruce Schneier A hacker looks at cryptography | 51 | |
|
410. | Amir Taaki ROJAVA CALL FOR A REVOLUTIONARY HACKER MOVEMENT AND THE STUDY OF POLYTECHNICS | 50 | |
|
411. | Hunting PBX for Vulnerabilities | 50 | |
|
412. | Lightning Talk Gigatron DIY TTL Computer by Walker Belgers | 50 | |
|
413. | Anthony Zboralski & Dave McKay Hacking Trust | 50 | |
|
414. | Modern Linux Heap Exploitation Dr Silvio Cesare | 50 | |
|
415. | Daniel Schell ASD Top 4 Compliance and what auditors look for - AusCERT 2017 | 50 | |
|
416. | Membership Inference Attacks against Machine Learning Models | 50 | |
|
417. | Introduction To GLIBC Heap Exploitation Max Kamper | 50 | |
|
418. | DeepSpeech by Mozilla | 50 | |
|
419. | Podman The Powerful Container Multi Tool An use case driven hands on to the container management … | 50 | |
|
420. | LemonLDAP NG 2 0 | 50 | |
|
421. | Andrea Barisani USB Armory | 50 | |
|
422. | tinc the difficulties of a peer to peer VPN on the hostile Internet | 50 | |
|
423. | Batch Techniques for Practical Private Information Retrieval | 50 | Guide |
|
424. | How To Defeat EDRs In Usermode Alessandro Magnosi & Jean Francois Maes | 49 | |
|
425. | Digital Predistortion Implementation and Use | 49 | |
|
426. | The Proxy Wars MySQL Router, ProxySQL, MariaDB MaxScale | 49 | |
|
427. | Max Schrems Talks Facebook and the ECJ at IAPP Data Protection Congress | 49 | |
|
428. | Overview of gr inspector A Signal Analysis Toolbox for GNU Radio | 49 | |
|
429. | The State Of Web Browsers Vs DOM Fuzzing In 2017 By Ivan Fratric | 49 | |
|
430. | IPhone Rootkit There S An App For That | 49 | |
|
431. | Jim Geovedi Satellite Telephony Security What Is and What Will Never Be | 49 | |
|
432. | Hacking BLE Bicycle Locks For Fun And A Small Profit Vincent Tan | 49 | |
|
433. | Integrated Spice Simulation with Kicad | 48 | |
|
434. | The Confidential Consortium Framework A framework to build secure, highly available, and performant… | 48 | | Consortium
|
435. | Deobfuscate UEFI BIOS Malware And Virtualized Packers Alexandre Borges | 48 | |
|
436. | Igor Pecovnik Armbian | 48 | |
|
437. | Can't Touch This Cloning Any Android HCE Contactless Card Slawomir Jasek | 48 | |
|
438. | Cross Drive Forensic Analysis | 48 | Guide |
|
439. | Introducing Network Scout Defending The Soft Center of Your Network | 48 | |
|
440. | Android and trusted execution environments by Jan Erik Ekberg | 48 | |
|
441. | Hacking embedded with OpenWrt Vladimir 'vovcia' Mitiouchev | 48 | |
|
442. | Automation Techniques in C++ Reverse Engineering | 48 | |
|
443. | Sneak into buildings with KNXnet IP Claire Vacherot | 48 | |
|
444. | Discover GraphQL with Python, Graphene and Odoo | 48 | |
|
445. | Get To The Money Hacking PoS And PoP Systems D Chastuhin & V Egorov | 48 | |
|
446. | New GPIO interface for linux user space GPIO character device API and libgpiod | 48 | |
|
447. | Side Channel Attacks Against iOS Crypto Libraries And More Najwa Aaraj | 47 | |
|
448. | Urbit the personal server A clean slate decentralized software stack | 47 | |
|
449. | Security Conference Harald Welte OsmocomBB GSM protocol level security in GSM networks | 47 | |
|
450. | Introduction to hardware hacking Hunny | 47 | |
|
451. | Friday Keynote by William Binney HOPE Number Nine 2012 | 47 | |
|
452. | Keynote speaker Darren Kitchen, Hak5 | 47 | |
|
453. | Implementation Pitfalls Of OAuth 2 0 Samit Anwer | 47 | |
|
454. | Lightning Talk RetDec An Open Source Machine Code Decompiler by Peter Matula | 47 | |
|
455. | Learning to Rank Explained for Dinosaurs | 47 | |
|
456. | Take Your Path Normalization Off And Pop 0days Out Orange Tsai | 47 | |
|
457. | Trojans In SS7 How They Bypass All Security Measures Sergey Puzankov | 46 | |
|
458. | Android security architecture by Nikolay Elenkov | 46 | |
|
459. | The Rustock Botnet Takedown Julia Wolf, Alex Lanstein | 46 | |
|
460. | RFIDIOts Practical RFID hacking without soldering irons Adam Laurie | 46 | |
|
461. | OWASP AMass Boot Camp by Jeff Foley Caffix | 46 | |
|
462. | Down The Rabbit Hole How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets | 46 | | Down The Rabbit Hole
|
463. | Howard Payne & Deviant Ollam Elevator Obscura Industry Hacks | 46 | |
|
464. | AXIOM open source cinema camera Project Introduction and current state of development | 46 | |
|
465. | CommSec Inspeckage Android Package Inspector Antonio Martins | 46 | |
|
466. | WebRender, the next generation graphics engine by Mozilla research A technical talk about the web r | 46 | |
|
467. | Servers can't be trusted, and thanks to tamper proof journals EteSync doesn't need to | 45 | |
|
468. | Snuffleupagus Killing bugclasses in PHP 7, virtual patching the rest | 45 | |
|
469. | A Picture’s Worth Digital Image Analysis Dr Neal Krawetz | 45 | |
|
470. | Felix FX Lindner Hacking Huawei VRP | 45 | |
|
471. | Linux Kernel Runtime Guard LKRG under the hood Adam pi3 Zabrocki | 45 | |
|
472. | Coreboot | 45 | |
|
473. | FluxBB | 45 | |
|
474. | MobilityDB Managing mobility data in PostGIS | 45 | |
|
475. | Shell scripting live Linux Forensics Dr Phil Polstra | 45 | |
|
476. | Travis Ormandy Making Software Dumber | 45 | |
|
477. | T2TRG 20190326 1610 | 45 | |
|
478. | Rethinking kubernetes networking with SRv6 and Contiv VPP | 45 | |
|
479. | Jaime Sánchez & Pablo San Emeterio WhatsApp Lies and VideoTapes | 45 | |
|
480. | Reimplementing Local RPC In Net James Forshaw | 45 | |
|
481. | JOSE ALEJANDRO RIVAS What your mother never told you about TEE | 45 | |
|
482. | Making poetry with Racket Come and see how to make Poems that are also Code | 45 | |
|
483. | Hacking Medical Devices And Healthcare Infrastructure Anirudh Duggal | 45 | |
|
484. | Understanding The Low Fragmentation Heap From Allocation To Exploitation | 45 | |
|
485. | CPU performance analysis for MySQL using Hot Cold Flame Graph | 45 | |
|
486. | Building a WebRTC gateway Hacking with WebRTC native API | 44 | |
|
487. | Why is Django 3 0 a revolution for building websites with Python From WSGI to ASGI and why it matt… | 44 | |
|
488. | Len Sassaman and Roger Dingledine Attacks on Anonymity SystemsTheory | 44 | |
|
489. | 319 Hashview a new tool aimed to improve your password cracking endeavors Casey Cammilleri Hans Lakh | 44 | |
|
490. | HDMI Hacking Displays Made Interesting Black Hat - Europe - 2012 | 44 | |
|
491. | Steve Anson Detecting Computer Intrusions | 44 | |
|
492. | rust vmm shared virtualization crates | 44 | |
|
493. | Easily Secure Your Front and Back End app with Keycloak | 44 | |
|
494. | The Grugq How The Leopard Hides His Spots OS X Anti Forensics Techniques | 44 | |
|
495. | SpinalHDL An alternative hardware description langage presentation | 44 | |
|
496. | Mustafa Al Bassam And Jake Davis Banned From Encrypting | 44 | |
|
497. | Stupid Pluto Tricks Real world things you can do with a PlutoSDR | 44 | |
|
498. | Unleash the Infection Monkey A Modern Alternative to Pen Tests | 44 | |
|
499. | Exploiting Qualcomm WLAN and Modem Over The Air | 43 | |
|
500. | SSSD From an LDAP client to the System Security Services Daemon | 43 | |
|