Search for "Olga" returned 131 results

Cryptography demystified
53 min

Cryptography demystified

An introduction without maths

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

A Blockchain Picture Book
36 min

A Blockchain Picture Book

Blockchain origins and related buzzwords, described in…

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

Wer liegt hier wem auf der Tasche?
56 min

Wer liegt hier wem auf der Tasche?

Genug mit dem Bürgergeld-Fetisch. Stürmt die Paläste!

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities