Welcome Note - Antriksh Shah Spreading The Load: Building A Better Hardware Hacking Community - Kate Temkin Strategies To Harden And Neutralize UAV Using RF DEW - José Lopes Esteves The Race To Secure Texas Instruments Graphing Calculators - Brandon Wilson It WISN't Me, Attacking Industrial Wireless Mesh Networks - Erwin Paternotte And Mattijs Van Ommeren There Goes Your PIN - Exploiting Smartphone Sensor Fusion Under Single And Cross User Setting - David Berend Smart Car Forensics And Sensor Warfare - Gabriel Cirlig And Stefan Tanase TLBleed: When Protecting Your CPU Caches Is Not Enough - Ben Gras And Kaveh Razavi CXO Panel - Who Needs IoT Security Certification? - People The Future Of Hardware Security Is In Open Standards - Helena Handschuh The Undercover World Of Reverse-Engineering Based Integrated Circuit Attacks - Olivier Thomas Z-Shave. Exploiting Z-Wave Downgrade Attacks - Andrew Tierney Bitfi - You Wouldn't Steal My Cloins - Andrew Tierney Fault Injection On Automotive Diagnosis Protocols - Santiago Cordoba Black Box Is Dead. Long Live Black Box! - Vladimir Kononovich And Aleksei Stennikov Product Security For IoT: Mission Impossible? - Alex Poschmann Closing Note And Prizes - Hardwear.io Crew
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
CLI program for cybersecurity solution management with multiple functionalities and authentication methods.
A comprehensive guide for implementing best practices in cybersecurity across various systems.
SecTor has built a reputation of bringing together experts from around the world to share their latest research and techniques involving underground threats and corporate defences.
Porting GNU/Linux userland tools to the bionic/Linux userland of Android to provide access to the audit stream for Android applications with minimal overhead.
A Node.js Ebook by GENTILHOMME Thomas, covering Node.js development and resources
SWFTools is a collection of utilities for working with Adobe Flash files, including tools for converting PDFs, images, audio, and video files to SWF format.
echoCTF is a computer security framework for running cybersecurity exercises and competitions like Capture the Flag, used for network penetration testing and security auditing.
Guidance on securing NFS in Red Hat Enterprise Linux 7
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.