The Keys To Running A Successful DEF CON Group By DC612
How To Get Your FBI File (and Other Information You Want From the Federal Government)
Our Instrumented Lives: Sensors, Sensors, Everywhere...
Your ISP and the Government: Best Friends Forever.
The Law of Laptop Search and Seizure
Search & Seizure & Golfballs
Exploiting Internet Surveillance Systems
Hacking Facebook Privacy
An Observatory for the SSLiverse
Bad Memories
FOCA2: The FOCA
Big Brother on the Big Screen: Fact/Fiction?
Changing Threats To Privacy: From TIA To Google
masSEXploitation
This Needs to be Fixed, and Other Jokes in Commit Statements
Trolling Reverse-Engineers with Math: Ness... It hurts...
pyREtic - In-memory Reverse Engineering for Obfuscated Python Bytecode
WPA Too!
How to Hack Millions of Routers
SHacking DOCSIS For Fun and Profit
Advanced Format String Attacks
Connection String Parameter Attacks
Browser Based Defenses
Constricting the Web: Offensive Python for Web Hackers
Repelling the Wily Insider
The Anatomy of Drug Testing
A New Approach to Forensic Methodology - !!BUSTED!! Case Studies
Open Source Framework for Advanced Intrusion Detection Solutions
Sniper Forensics - One Shot, One Kill
0box Analyzer: AfterDark Runtime Forensics for Automated Malware Analysis and Clustering