Search for "wonko"
next
22 min
iPXE Server aufsetzen und konfigurieren
40 min
Techniques - Tools - Tricks
32 min
Automatic detection of key-reuse vulnerabilities
29 min
Technical Teardown of the Pegasus malware and Trident…
53 min
An introduction without maths
58 min
Breaking PDF Encryption and PDF Signatures
60 min
...or why adding BTLE to a device sometimes isn't smart at…
44 min
teaching a new dog old tricks
46 min
--Gaining code execution using a malicious SQLite database
37 min
Don't ask what you can do for TPMs, Ask what TPMs can do…
64 min
Dissecting a Modern Wireless Network for the Internet of…
next