DEF CON 101 - The Talk
Paging SDR... Why should the NSA have all the fun?
Protecting SCADA From the Ground Up
One Man Shop: Building an effective security program all by yourself
In the forest of knowledge with 1o57
Oh Bother, Cruising The Internet With Your Honeys, Creating Honeynets For Tracking Criminal Organizations
RFIDler: SDR.RFID.FTW
Oracle Data Redaction is Broken
Abuse of Blind Automation in Security Tools
From root to SPECIAL: Pwning IBM Mainframes
The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns
Bypass firewalls, application white lists, secure remote desktops under 20 seconds
Extreme Privilege Escalation On Windows 8/UEFI Systems
Veil-Pillage: Post-exploitation 2.0
Acquire current user hashes without admin privileges
Why Don’t You Just Tell Me Where The ROP Isn’t Supposed To Go
The Secret Life of Krbtgt
Mass Scanning the Internet: Tips, Tricks, Results
I Hunt TR-069 Admins: Pwning ISPs Like a Boss
Don't DDoS Me Bro: Practical DDoS Defense
Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring
Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring.
VoIP Wars: Attack of the Cisco Phones
Abusing Software Defined Networks
Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse
Surveillance on the Silver Screen- Fact or Fiction?
I am a legend: Hacking Hearthstone with machine learning
Through the Looking-Glass, and What Eve Found There
Catching Malware En Masse: DNS and IP Style
Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System
Generating ROP payloads from numbers
Shellcodes for ARM: Your Pills Don't Work on Me, x86