Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
17,287 results
PULL OVER! No, it is a cardigan, but thanks for noticing! After getting a nasty speeding ticket, OG SecKC HA/KC/ER hevnsnt ...
647,613 views
5 years ago
You've seen plenty of talks on exploiting, escalating, and exfiltrating the magical world of Google Cloud (GCP), but what about its ...
7,198 views
3 years ago
Friday, July 12, 2024: 1:00 pm (Tobin 201/202): Some people consider ham radio operators to be the original hackers. In this talk ...
563 views
2 months ago
The Russia-Ukraine war has seen a lot of computer hacking, on both sides, by nations, haxor collectives, and random citizens, ...
53,023 views
2 years ago
An embarrassingly long time ago, Another Maker sent me a Sonoff Basic WIFI controlled switching module. Today I'm finally ...
10,574 views
Introduced in 2012, Secure Boot - the OG trust in boot - has become a foundational rock in modern computing and is used by ...
1,925 views
This is a recording of Jonko's (project lead @haroohie) panel at Retro World Expo in August of 2023 in which he discusses ROM ...
2,813 views
1 year ago
In this talk, we will introduce the most comprehensive offensive VoIP security tool ever developed, Mr.SIP (comprehensive ...
6,041 views
4 years ago
Durant cette conférence, nous explorerons les faiblesses des systèmes de satellites et les méthodes pour les exploiter.
7,793 views
3 months ago
The Baseboard Management Controller (BMC) is a specialized microcontroller embedded on the motherboard, typically used in ...
5,471 views
In whch yr hmbl svt makes an incredibly cheap trash smartwatch run Micropython. This is me disassembling, exploring, ...
364,426 views
7 months ago
The Shadytel cabal had an unprecedented opportunity to legally uplink to and use a vacant transponder slot on a geostationary ...
2,912 views
In this video we hear the story how Ezequiel Pereira found a critical vulnerability in Google Cloud and was awarded $164674 in ...
1,071,644 views
The hacking subculture's closest relative is that of the Darknet. Both have knowledgeable people, many of whom are highly ...
437,207 views
Jonko explains how to get started with ROM hacking games for the purpose of translating them by recounting how he hacked the ...
15,776 views
Is someone spying on you? This talk will present several low-tech ways that you can detect even high-tech surveillance. Topics ...
132,129 views
10 years ago
We take a scenic tour through the origins of the UK train ticket, from the original BR specification in the 1980s through to modern ...
3,360 views
How I hacked the entire American Food Supply Chain over the course of 3 months, assembled a team of hacker strangers, and ...
27,696 views
The most profound change in radio technology in 100 years is happening now. Radios are transforming from the spaghetti of ...
25,568 views
C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...
13,891 views