Windows Breakout and Privilege Escalation
Malware Traffic Analysis Workshop
Reverse Engineering Android Apps
Knowing the Unknown: Using PCAP to Break Down Application-Layer Protocols
Hands-on: How to Use CALDERA's Chain Mode
Active Directory security: 8 (very) low hanging fruits and how to smash those attack paths
Hacking the STORM
Using Wireshark for Incident Response and Threat Hunting
Introduction to Cryptographic Attacks
Linux Hardening - The Easy Way
Tournament: The Ultimate Secure Coding Throw Down
Finding Evil with Mitre ATT&CK and the Elastic Stack
Pentesting ICS 102
Hands on Hacking The OWASP TOP 10 and beyond