decompile
0001-01-01
Decompilation is the process of producing source code from compiled objects/binaries.
Read More
decompiler
0001-01-01
A decompiler is a software application that translates compiled executables into source code.
Read More
Decoy Dog
0001-01-01
Decoy Dog is a malware toolkit based on pupy that uses DNS to communicate. ...
Read More
decrypt
0001-01-01
Decryption is the process of turning encrypted ciphertext into plaintext.
Read More
deep packet inspection
0001-01-01
Deep Packet Inspection (DPI) is a method of examining computer network traffic as packets as it travels through the network.
DPI is a fancy form of ...
Read More
deepfake
0001-01-01
A deepfake is a manipulated video, photo, or recording using artificial intelligence that appears convincingly realistic. Deepfakes are typically used ...
Read More
DEF CON
0001-01-01
DEF CON is an annual hacking conference held in Las Vegas, Nevada.
Read More
DEF CON group
0001-01-01
A DEF CON Group is a local community inspired by the DEF CON conference.
Read More
default insecure
0001-01-01
Many software and hardware vendors release products containing default settings that are inherently insecure, leading their users and customers to be ...
Read More
default password
0001-01-01
Many software and hardware solutions are shipped with default passwords or default credentials enabled. Default credentials are meant to be changed, ...
Read More