DEF CON 15 - Subere - Fingerprinting and Cracking Java Obfuscated Code

48:47
DEF CON 15 - Stracener and Luck - Hacking the EULA

43:05
DEF CON 32 - Winning the Game of Active Directory - Brandon Colley

24:16
Sui Move Smart Contract Development 2025 Tutorial 7b - Structs Abilities(Assignment Solution)

29:49
DEFCON 15: Fingerprinting and Cracking Java Obfuscated Code

38:34
DEF CON 32 - Where’s the Money-Defeating ATM Disk Encryption - Matt Burch

8:54
Germany’s Far-Right Comeback | NYT Opinion

13:56
everything is open source if you can reverse engineer (try it RIGHT NOW!)

1:03:43