DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering Published 2015-12-25 Download video MP4 360p Download video MP4 720p Recommendations 46:04 DEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 2:50:50 Reverse Engineering and Weaponizing XP Solitaire (Mini-Course) 46:34 The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation 47:34 DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline 48:29 DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor 37:23 DEF CON 31 - SpamChannel - Spoofing Emails From 2M+ Domains & Virtually Becoming Satan - byt3bl33d3r 50:50 The Search for the Perfect Door - Deviant Ollam 1:50:57 DEFCON - The Full Documentary 49:33 Defcon 21 - Defense by numbers: Making Problems for Script Kiddies and Scanner Monkeys 33:36 Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker 1:59:16 Reverse Engineering Data Files 46:19 Break Me00 The MoVfuscator Turning mov into a soul crushing RE nightmare Christopher Domas 44:29 Breaking the x86 Instruction Set 1:49:37 66. James Lindsay on Psychological Warfare 13:56 everything is open source if you can reverse engineer (try it RIGHT NOW!) 37:38 The Science Behind Human Hacking (Social Engineering) - Christopher Hadnagy 41:18 Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference 20:31 DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin 1:47:13 Bjarne Stroustrup: C++ | Lex Fridman Podcast #48 Similar videos 45:31 DEF CON 23 - Samy Kamkar - Drive it like you Hacked it: New Attacks and Tools to Wireles 31:29 DEF CON 23 - Amit Ashbel & Maty Siman - Game of Hacks: Play, Hack & Track - 101 Track 49:17 DEF CON 26 - Nirenberg and Buchwald - Reverse Engineering Hacking Documentary Series 48:14 DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits 46:04 DEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPU 42:20 DEF CON 23 - Atlas - Fun with Symboliks 16:45 Chris Domas: The 1s and 0s behind cyber warfare 45:32 DEF CON 23 - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research 01:44 DEF CON 24 - RISE OF THE MACHINES 42:57 DEF CON 23 - Colin Flynn - Dont Whisper my Chips: Sidechannel and Glitching for Fun and Profit 01:08 DEF CON 25 - SupaFraud - Official DEF CON Teaser Video 51:27 DEF CON 24 SE Village - Chris Hadnagy - 7 Jedi Mind Tricks: Influence Your Target without a Word 39:56 reductio ad absurdum by Christopher Domas 37:47 DEF CON 23 Conference Weston Hecker Goodbye Memory Scraping Malware 38:31 DEF CON 23 - Michael Schrenk - Applied Intelligence: Using Information Thats Not There 43:08 Kartograph - Applying Reverse Engineering Techniques to Map Hacking - Defcon 18 More results