Create a gist now

Instantly share code, notes, and snippets.

What would you like to do?
Date: Wed Jan 11 2017 20:23:08 GMT+0100 (CET)
1. Console Hacking 2016 (24941)
2. SpiegelMining – Reverse Engineering von Spiegel-Online (22407)
3. Fnord-Jahresrückblick (18797)
4. Shut Up and Take My Money! (16545)
5. Where in the World Is Carmen Sandiego? (12774)
6. Security Nightmares 0x11 (10648)
7. How Do I Crack Satellite and Cable Pay TV? (9553)
8. Die Sprache der Populisten (9157)
9. Copywrongs 2.0 (7837)
10. Methodisch inkorrekt! (7251)
11. Nintendo Hacking 2016 (7246)
12. Nicht öffentlich. (6988)
13. 33C3 Opening Ceremony (6866)
14. The Untold Story of Edward Snowden’s Escape from Hong Kong (6475)
15. The Ultimate Game Boy Talk (6076)
16. Dieselgate – A year later (6057)
17. 33C3 Closing Ceremony (6012)
18. Machine Dreams (5838)
19. The Global Assassination Grid (5604)
20. Check Your Police Record! (5434)
21. Build your own NSA (5051)
22. Gone in 60 Milliseconds (5027)
23. 33C3 Infrastructure Review (5022)
24. A look into the Mobile Messaging Black Box (4507)
25. Bootstraping a slightly more secure laptop (4482)
26. Shining some light on the Amazon Dash button (4432)
27. Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken (4365)
28. 3 Years After Snowden: Is Germany fighting State Surveillance? (4313)
29. Software Defined Emissions (4231)
30. Woolim – Lifting the Fog on DPRK’s Latest Tablet PC (3979)
31. Eine kleine Geschichte der Parlamentsschlägerei (3973)
32. The 12 Networking Truths (3656)
33. Es sind die kleinen Dinge im Leben (3533)
34. Surveilling the surveillers (3530)
35. Make Wi-Fi fast again (3447)
36. Hochsicherheits-Generalschlüssel Marke Eigenbau (3402)
37. Deploying TLS 1.3: the great, the good and the bad (3329)
38. Einführung zu Blockchains (3270)
39. Talking Behind Your Back (3252)
40. Lockpicking in the IoT (3088)
41. Der 33 Jahrerückblick (3059)
42. The Transhumanist Paradox (2970)
43. What could possibly go wrong with <insert x86 instruction here>? (2947)
44. Retail Surveillance / Retail Countersurveillance (2941)
45. Dissecting modern (3G/4G) cellular modems (2891)
46. A Data Point Walks Into a Bar (2764)
47. Kampf dem Abmahnunwesen (2715)
48. Exploiting PHP7 unserialize (2689)
49. Durchmarsch von Rechts (2514)
50. Hacking the World (2486)
51. Berechnete Welt (2403)
52. ATMs how to break them to stop the fraud (2399)
53. The Universe Is, Like, Seriously Huge (2294)
54. Irren ist staatlich (2228)
55. You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet (2169)
56. Reverse engineering Outernet (2166)
57. Dissecting HDMI (2143)
58. Everything you always wanted to know about Certificate Transparency (2092)
59. radare demystified (2080)
60. The Moon and European Space Exploration (2074)
61. Law Enforcement Are Hacking the Planet (2073)
62. Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern (2009)
63. Recount 2016: An Uninvited Security Audit of the U.S. Presidential Election (1985)
64. A world without blockchain (1980)
65. The Zcash anonymous cryptocurrency (1954)
66. How physicists analyze massive data: LHC + brain + ROOT = Higgs (1893)
67. Zwischen Technikbegeisterung und kritischer Reflexion: Chaos macht Schule (1875)
68. Routerzwang und Funkabschottung (1875)
69. Searchwing - Mit Drohnen leben retten (1871)
70. A New Dark Age (1840)
71. Warum in die Ferne schweifen, wenn das Ausland liegt so nah? (1821)
72. The Fight for Encryption in 2016 (1816)
73. An Elevator to the Moon (and back) (1794)
74. Visiting The Bear Den (1783)
75. Privatisierung der Rechtsdurchsetzung (1778)
76. International exchange of tax information (1751)
77. Interplanetary Colonization (1715)
78. Corporate surveillance, digital tracking, big data & privacy (1709)
79. Geolocation methods in mobile networks (1689)
80. Downgrading iOS: From past to present (1645)
81. Decoding the LoRa PHY (1642)
82. Genetic Codes and what they tell us – and everyone else (1630)
83. Pegasus internals (1599)
84. On Smart Cities, Smart Energy, And Dumb Security (1584)
85. In Search of Evidence-Based IT-Security (1548)
86. Intercoms Hacking (1477)
87. Building a high throughput low-latency PCIe based SDR (1462)
88. Memory Deduplication: The Curse that Keeps on Giving (1420)
89. Beyond Virtual and Augmented Reality (1416)
90. Eavesdropping on the Dark Cosmos (1405)
91. No USB? No problem. (1402)
92. The Clash of Digitalizations (1376)
93. The High Priests of the Digital Age (1374)
94. CCC-Jahresrückblick 2016 (1344)
95. Untrusting the CPU (1319)
96. Building Custom Pinball Machines (1317)
97. Hebocon (1305)
98. Stopping law enforcement hacking (1302)
99. Million Dollar Dissidents and the Rest of Us (1282)
100. Virtual Secure Boot (1264)
101. What's It Doing Now? (1244)
102. The woman behind your WiFi (1210)
103. The DROWN Attack (1204)
104. Understanding the Snooper’s Charter (1180)
105. Anthropology for kids - What is privacy? (1165)
106. A Story of Discrimination and Unfairness (1142)
107. How do we know our PRNGs work properly? (1123)
108. Lightning Talks Day 2 (1093)
109. Tapping into the core (1076)
110. Hacking Reality (1073)
111. Rebel Cities (1060)
112. Wheel of Fortune (1056)
113. On the Security and Privacy of Modern Single Sign-On in the Web (1055)
114. Lightning Talks Day 4 (1052)
115. Lasers in the sky (with asteroids) (1034)
116. No Love for the US Gov. (1018)
117. Datenschutzgrundverordnung: Rechte für Menschen, Pflichten für Firmen & Chancen für uns (1006)
118. Netzpolitik in Österreich (993)
119. Von Alpakas, Hasenbären und Einhörnern – Über Anerkennungskultur (987)
120. Predicting and Abusing WPA2/802.11 Group Keys (948)
121. Edible Soft Robotics (936)
122. Technologien für und wider Digitale Souveränität (892)
123. Make the Internet Neutral Again (875)
124. PUFs, protection, privacy, PRNGs (861)
125. Keys of Fury (843)
126. From Server Farm to Data Table (824)
127. Space making/space shaping (796)
128. What We Can Learn about Creativity from 3D Printing (766)
129. The Nibbletronic (757)
130. Making Technology Inclusive Through Papercraft and Sound (751)
131. Saving the World with (Vegan) Science (749)
132. Ethics in the data society (703)
133. Netzpolitik in der Schweiz 2016 (686)
134. Lightning Talks Day 3 (680)
135. Code BROWN in the Air (667)
136. Welcome to the Anthropocene? (659)
137. Community (653)
138. Haft für Whistleblower? (610)
139. SpinalHDL : An alternative hardware description language (546)
140. The Economic Consequences of Internet Censorship (529)
141. Do as I Say not as I Do: Stealth Modification of Programmable Logic Controllers I/O by Pin Control Attack (495)
142. Syrian Archive (461)
143. Liberté, Égalité, Fraternité... and privacy ?! (447)
144. Formal Verification of Verilog HDL with Yosys-SMTBMC (382)
145. Hacking collective as a laboratory (320)
146. State of Internet Censorship 2016 (224)
147. JODI - Apache is functioning normally (159)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment