Behind the Scenes of the DEF CON 27 Badge
Don't Red-Team AI Like a Chump
Process Injection Techniques - Gotta Catch Them All
HackPac: Hacking Pointer Authentication in iOS User Space
Harnessing Weapons of Mac Destruction
MOSE: Using Configuration Management for Evil
Please Inject Me, a x64 Code Injection
Poking the S in SD cards
Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks
Your Car is My Car
How You Can Buy AT&T, T-Mobile, and Sprint Real-Time Location Data on the Black Market
RACE - Minimal Rights and ACE for Active Directory Dominance
SELECT code_execution FROM * USING SQLite;—Gaining code execution using a malicious SQLite database
Get off the Kernel if you can’t Drive
Reverse Engineering 17+ Cars in Less Than 10 Minutes
Unpacking Pkgs: A Look Inside Macos Installer Packages And Common Security Flaws
Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers
The ABC of Next-Gen Shellcoding
I'm In Your Cloud... Pwning Your Azure Environement
[ MI CASA-SU CASA ] My 192.168.1.1 is Your 192.168.1.1
Firmware Slap: Automating Discovery of Exploitable Vulnerabilities in Firmware