decompile

0001-01-01

Decompilation is the process of producing source code from compiled objects/binaries.

Read More

decompiler

0001-01-01

A decompiler is a software application that translates compiled executables into source code.

Read More

Decoy Dog

0001-01-01

Decoy Dog is a malware toolkit based on pupy that uses DNS to communicate. ...

Read More

decrypt

0001-01-01

Decryption is the process of turning encrypted ciphertext into plaintext.

Read More

deep packet inspection

0001-01-01

Deep Packet Inspection (DPI) is a method of examining computer network traffic as packets as it travels through the network.

DPI is a fancy form of ...

Read More

deepfake

0001-01-01

A deepfake is a manipulated video, photo, or recording using artificial intelligence that appears convincingly realistic. Deepfakes are typically used ...

Read More

DEF CON

0001-01-01

DEF CON is an annual hacking conference held in Las Vegas, Nevada.

Read More

DEF CON group

0001-01-01

A DEF CON Group is a local community inspired by the DEF CON conference.

Read More

default insecure

0001-01-01

Many software and hardware vendors release products containing default settings that are inherently insecure, leading their users and customers to be ...

Read More

default password

0001-01-01

Many software and hardware solutions are shipped with default passwords or default credentials enabled. Default credentials are meant to be changed, ...

Read More