72 тысяч подписчиков
4 тысяч видео
DEF CON 27 - Michael Stepankin - Apache Solr Injection
Learn Python TDD Style with Python Koans
DEFCON 19 Hacking MMORPGs for Fun and Mostly Profit ( w speaker)
peer to peer communism vs the client-server state [SIGINT10]
DEF CON 26 - Ossmann and Spill - Revolting Radios
[Linux.conf.au 2013] - redgrep from regular expression derivatives to LLVM
[Linux.conf.au 2013] - Configuration Management with Ansible
DEF CON 27 - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware
DEF CON 27 - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design
Advanced Celery
PYCON US 2013 - Using Python to Code by Voice
[Linux.conf.au 2012] Scaling OpenStack Development with git Gerrit and Jenkins
31C3 - Tor Hidden Services and Deanonymisation
DEF CON 23 - Joshua Smith - High Def Fuzzing: Exploring Vulnerabilities in HDMI CEC
30c3 - An introduction to Firmware Analysis
Introduction to SQLAlchemy
Defcon 21 - Backdoors, Government Hacking and The Next Crypto Wars
Customizing the Django Admin: The How and the Why
Zero to App Bootstrapping in Angular + Designing Unit Tests - NYC Meetup
DEF CON 24 - Direct Memory Attack the Kernel
DEF CON 27 - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud
DEF CON 27 - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air
Practical Machine Learning in Python
DEF CON 27 - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery
DEF CON 27 - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks
DEF CON 27 - Patrick Wardle - Harnessing Weapons of Mac Destruction
DEF CON 27 - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits
DEF CON 27 - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors
DEF CON 27 - Campbell Murray - GSM We Can Hear Everyone Now
DEF CON 27 - More Keys Than A Piano: Finding Secrets In Publicly Exposed Ebs Volumes
DEF CON 27 - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government
DEF CON 27 - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets
[Linux.conf.au 2013] - OWASP Developer Guide 2013 what it means for open source projects
DEF CON 27 - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot
DEF CON 27 - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware
DEF CON 27 - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance
[Linux.conf.au 2012] Using Open Source to Build a Gravitational Wave Observatory
[Linux.conf.au 2013] - grand distributed storage debate glusterfs and ceph going head head
DEF CON 27 - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces
DEF CON 27 - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space
DEF CON 27 - XiaoHuiHui - All the 4G Modules Could Be Hacked
DEF CON 27 - smea - Adventures In Smart Buttplug Penetration testing
Defcon 18 - ChaosVPN for Playing CTFs mc fly ryd vyrus no Maam
Defcon 21 - Unexpected Stories - From a Hacker Who Made It Inside the Government
Black Hat 2013 - Press ROOT to Continue: Detecting OSX and Windows Bootkits with RDFU
DEF CON 27 - Christopher Wade - Tag-side attacks against NFC
DEF CON 27 - Marina Simakov - Relaying Credentials Has Never Been Easier
Introduction to Django
Pycon US 2012 - The Art of Subclassing
DEF CON 27 - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming
OpenSecurityTraining Introductory Intel x86 (Day 2 part 2)