Search for "Ezi"

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

Cryptography demystified
53 min

Cryptography demystified

An introduction without maths

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

Autoboot
60 min

Autoboot

Offene Boot Firmware leicht gemacht

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks