种子简介
种子名称:
May Contain Hackers
文件类型:
视频
文件数目:
130个文件
文件大小:
7.57 GB
收录时间:
2023-12-28 08:45
已经下载:
3次
资源热度:
48
最近下载:
2024-11-24 12:26
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:99956b75ddb52745f468b6856fb375a390b7aa52&dn=May Contain Hackers
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
May Contain Hackers.torrent
A Brief History of Automotive Insecurities.mp468.19MB
A CISO approach to pentesting - why so many reports are never used.mp464.9MB
A Smart Light Hacking Journey.mp462.49MB
All you never wanted to know about the Banking System and why it keeps crashing Economics.mp464.56MB
An Ontology Of Electronic Waste.mp444.13MB
Attribution is bullshit - change my mind.mp434.13MB
Audio networks and their security implications.mp453.06MB
Automatically Suspicious - Predictive policing in the Netherlands.mp463.64MB
Badge talk.mp467.1MB
Bring Your Own IDentity.mp459.5MB
bug hunting for normal people.mp464.29MB
Building a cheap laser harp for percussionists.mp456.74MB
Building modern and robust Web-Applications in 2021, without writing any JavaScript.mp447.49MB
Censoring the internet & how to bypass it.mp461.07MB
Climate Crisis The gravity of the situation. What is going on.mp4210.66MB
Computing within Limits.mp462.7MB
Cryptography is easy, but no magic. Use it. Wisely.mp432.06MB
Cyber crises and what you can do to face the challenge.mp462.94MB
Decoding the Anker 3800 lock.mp474.73MB
Democracy Eventually Digitally Transparent.mp459.22MB
Detecting Log4J on a global scale using collaborative security.mp433.37MB
Digital Civil Disobedience.mp467.22MB
Don't turn your back on Ransomware.mp440.68MB
drand publicly verifiable randomness explained.mp452.65MB
Electric Vehicles Are Going To Suck - Here's Why.mp458.18MB
Electron microscopes - How we learned to stop worrying and love cheap lab equipment.mp455.94MB
Electronic Locks Bumping and Other Mischief.mp439.41MB
Ethics does not belong on the wall Ethical framework for the use of location data.mp465.85MB
Everything is an input device (fun with barcodes).mp442.34MB
Fault Injection on a modern multicore System on Chip.mp474.37MB
Finding 0days in Enterprise Web Applications.mp451.73MB
First Privacy, Now Safety An Anthology of Tales from the Front Lines of Cyber Physical Secu.mp469.37MB
Free children from the digital stranglehold.mp475.74MB
Freedom, Ownership, Infrastructure, and Hope.mp481.07MB
FreeSewing sewing patterns based on code.mp443.23MB
Gigatron - creating a hobby kit.mp477.66MB
GPS ankle monitor hacking How I got stalked by people from the Arab Emirates.mp457.65MB
Guardians of the Dutch healthcare.mp427.44MB
hack your brain.mp459.18MB
Hacking COVID Hackers helping the government.mp479.94MB
Hacking the genome how does it work, and should we.mp463.98MB
Hacking the pandemic's most popular software Zoom.mp458.67MB
Hacking the Quincy Drawing Robot (and possible win one).mp435.45MB
Hacking UK train tickets for fun, but not for profit.mp435.26MB
Hacking with Microbes.mp472.92MB
Heuristic Park (why we can fake it until we make it).mp468.31MB
HomeComputerMuseum, the making, the challenges and the importance.mp471.3MB
Honey, let's hack the kitchen attacks on critical and not-so-critical cyber physical system.mp451.52MB
Hope - It is too late to be pessimistic (about climate change).mp4160.85MB
How do GPS Galileo really work & how the galmon.eu monitors all navigation satellites.mp454.93MB
How I made the municipality pay a 600.000 euro fine for invading your privacy.mp434.16MB
How to charge your car the open source way with EVerest.mp424.02MB
How to Secure the Software Supply Chain.mp457.83MB
How to sneak past the Blue Team of your nightmares.mp454.97MB
ICS stands for Insecure Control Systems.mp465.42MB
illumos SmartOS, specialized Type 1 Hypervisor.mp432.55MB
Infrastructure review.mp479.11MB
Intro to OSINT and Geolocation.mp469.72MB
Introducing CSIRT.global if you love the internet, we need your help.mp439.84MB
Introduction to MQTT, Node-RED & Tasmota.mp443.35MB
IOT International Outage Technology (Disclosure of DIVD-2022-00009).mp426.43MB
IRMA and Verifiable Credentials.mp431.19MB
IRMA's Idemix core Understanding the crypto behind selective, unlinkable attribute disclosu.mp453.91MB
It's not just stalkerware.mp430.73MB
Keep Ukraine Connected.mp447.58MB
Knock knock, who’s there Is your door locked Are you sure.mp427.7MB
Lightning Talks Friday.mp454.5MB
Lightning Talks Monday.mp481.75MB
Lightning Talks Saturday.mp474.87MB
Lightning Talks Sunday.mp4110.31MB
Lightning Talks Tuesday.mp475.16MB
Literally Hacking the Planet How Earth Systems Models Work.mp472.86MB
Live streaming 360° video with your own infrastructure.mp447.45MB
macOS local security escaping the sandbox and bypassing TCC.mp461.99MB
Meta-Press.es - Decentralized search engine for press reviews.mp454.89MB
Modernizing the Tor Ecosystem for the Future.mp466.56MB
My journey to find vulnerabilities in macOS.mp449.88MB
M̶a̶y̶ - Will Contain Climate Change.mp472.94MB
No Permissions Needed.mp434.69MB
Non-Euclidean Doom what happens to a game when pi is not 3.14159.mp429.12MB
Nuggets of Shannon Information Theory.mp456.08MB
OpenKAT Looking at security with cat eyes.mp475.36MB
OpenRAN - 5G hacking just got a lot more interesting.mp474.56MB
Payment terminals as general purpose (game-)computers.mp456.44MB
Plotting the Pandemic or Any Other Catastrophe-Movie.mp472.48MB
PolyCoin - A game played across MCH - How it works and what is inside it.mp453.63MB
Programming microcontrollers in Go using TinyGo.mp438.68MB
Project TEMPA - Demystifying Tesla's Bluetooth Passive Entry System.mp467.35MB
PSD2 a banking standard for scammers.mp436.15MB
RE-VoLTE Should we stop the shutdown of 2G 3G to save lives.mp436.56MB
Reclaiming our faces.mp438.2MB
Repair for Future.mp452.68MB
Reproducible Builds for Trustworthy Binaries.mp433.66MB
Respirators, Runtime Errors, Regulations - A Journey into Medical Software Realization.mp466.59MB
Reverse engineering the Albert Heijn app for fun and profit.mp447.41MB
Rocking the Web Bloat Modern Gopher, Gemini and the Small Internet.mp462.86MB
Running a Domain Registrar for Fun and (some) Profit.mp467.44MB
Running a mainframe on your laptop for fun and profit.mp458.81MB
Scanning and reporting vulnerabilities for the whole IPv4 space. How the Dutch Institute for.mp474.15MB
Scientist Rebellion.mp465.5MB
Screaming into the void All e-signatures in the world are broken.mp431.1MB
Sensor.Community - Global Open Environmental Data Platform.mp468.78MB
Signal you were the chosen one.mp453.73MB
Single Sign-On A Hacker's Perspective.mp453.64MB
SSH Configuration, Intermediate Level.mp451.35MB
Successfully building and programming sound field control systems.mp454.72MB
Taking Action against SLAPPs in Europe.mp477.43MB
TASBot OoT ACE How to get the Triforce on an N64 via controller input.mp471.97MB
Tech didn’t cause misinformation, and it won’t solve it (by itself).mp473.91MB
The art of online discobingo.mp461.69MB
The Best Worst Thing.mp442.4MB
The MCH2022 Design.mp425.41MB
The Silicon Passion.mp4137.2MB
The smart home I didn't ask for.mp438.28MB
The tooling ecosystem that adds joy to KiCad.mp432.87MB
The War in Ukraine Cyberfront.mp4140.69MB
Threat modeling mechanical locking systems, by analyzing puzzles.mp444.01MB
TIC-80 byte jam.mp4218.37MB
Trusted CDNs without gatekeepers.mp456.5MB
UBports Imagine a phone that does everything you expect and nothing you don't.mp455.22MB
Using Passcrow to recover from lost passwords.mp444.89MB
What can AI learn from your face The making of HowNormalAmI.eu.mp438.69MB
What have you done against covid (a personal retrospective).mp478.09MB
What if locks could talk - what stories would they tell.mp448.22MB
What to do when someone close to you takes their life and you are not Tech-Savvy.mp444.53MB
Where did all the parts go - the 202x component availability trashfire.mp438.61MB
Wired Norms Inscription, resistance, and subversion in the governance of the Internet infra.mp464.11MB
World in Vectors - Cross-platform Map Rendering using Rust.mp428.39MB
⚠️ May Contain Hackers 2022 Closing.mp432.65MB
⚠️ May Contain Hackers 2022 Opening.mp463.81MB