Search for "%s" returned 12406 results

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Funky File Formats
51 min

Funky File Formats

Advanced binary tricks

Gone in 60 Milliseconds
33 min

Gone in 60 Milliseconds

Intrusion and Exfiltration in Server-less Architectures

2 Takte später
29 min

2 Takte später

30C3S SCE mbH: GEMA-Konkurrenz für Fortgeschrittene

Freedom needs fighters!
60 min

Freedom needs fighters!

Wie die GFF mit strategischen Klagen für Freiheitsrechte…

SD-WAN a New Hop
49 min

SD-WAN a New Hop

How to hack software defined network and keep your sanity?

Why Do We Anthropomorphize Computers?...
32 min

Why Do We Anthropomorphize Computers?...

...and dehumanize ourselves in the process?

PUFs, protection, privacy, PRNGs
31 min

PUFs, protection, privacy, PRNGs

an overview of physically unclonable functions

CIA vs. Wikileaks
58 min

CIA vs. Wikileaks

Intimiditation surveillance and other tactics observed and…

Zamir Transnational Network und Zagreb Dairy
61 min

Zamir Transnational Network und Zagreb Dairy

Das erste computer netzwerk in Krieg (Jugoslavia 1992-1997)