Search for "sec" returned 2586 results

60 min
The Exploration and Exploitation of an SD Memory Card
by xobs & bunnie

41 min
Our Time in a Product Review Cabal
And the malware and backdoors that came with it.

71 min
37C3 Infrastructure Review
Teams presenting how they helped making this awesome event

60 min
Ghidra - An Open Source Reverse Engineering Tool
How the NSA open-sourced all software in 2019

36 min
Apple's iPhone 15: Under the C
Hardware hacking tooling for the new iPhone generation

37 min
Digitale Rohstoffe erhalten sich anders
Über Ampeln und den Erhalt eines Rohstoffes namens Software

53 min
Self-cannibalizing AI
Artistic Strategies to expose generative text-to-image…

58 min
How to Break PDFs
Breaking PDF Encryption and PDF Signatures

46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database

40 min
Fuzz Everything, Everywhere, All at Once
Advanced QEMU-based fuzzing

61 min