Search for "Cass May" returned 2484 results

55 min
What could possibly go wrong with <insert x86 instruction here>?
Side effects include side-channel attacks and bypassing…

42 min
Hacking the Nintendo Game & Watch
Your princess is AES encrypted in another castle

31 min
Fine tuning log routing
How sequence and creating name-value pairs can help you

60 min
The plain simple reality of entropy
Or how I learned to stop worrying and love urandom

42 min
Reverse engineering FPGAs
Dissecting FPGAs from bottom up, extracting schematics and…

38 min
Wir müssen über KI sprechen
trotz des Hypes

40 min
Intercoms Hacking
Call the frontdoor to install your backdoors

59 min
Hardsploit: A Metasploit-like tool for hardware hacking
A complete toolbox for IoT security

30 min
Shut Up and Take My Money!
The Red Pill of N26 Security

40 min
An introduction to Firmware Analysis
Techniques - Tools - Tricks

62 min
Machine Dreams
Dreaming Machines

85 min