Social Engineering The News
Uncovering useful and embarrassing info with Maltego
There's no place like 127.0.0.1 - Achieving reliable DNS rebinding in modern browsers
From Box to Backdoor: Using Old School Tools and Techniques to Discover Backdoors in Modern Devices
Porosity: A Decompiler For Blockchain-Based Smart Contracts Bytecode
Amateur Digital Archeology
Hacking the Cloud
Inside the "Meet Desai" Attack: Defending Distributed Targets from Distributed Attacks
DEF CON 101 Panel
macOS/iOS Kernel Debugging and Heap Feng Shui
Offensive Malware Analysis: Dissecting OSX/FruitFly via a Custom C&C Server
Rage Against the Weaponized AI Propaganda Machine
CITL and the Digital Standard - A Year Later
Controlling IoT devices with crafted radio signals
Using GPS Spoofing to control time
Assembly Language is Too High Level
Radio Exploitation 101: Characterizing, Contextualizing, and Applying Wireless Attack Methods
Cisco Catalyst Exploitation
Persisting with Microsoft Office: Abusing Extensibility Options
Breaking Wind: Adventures in Hacking Wind Farm Control Networks
Microservices and FaaS for Offensive Security
Abusing Webhooks for Command and Control
Driving down the rabbit hole
Demystifying Windows Kernel Exploitation by Abusing GDI Objects.
Attacking Autonomic Networks
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt)
Dealing the perfect hand - Shuffling memory blocks on z/OS
Here to stay: Gaining persistency by abusing advanced authentication mechanisms
Unboxing Android: Everything you wanted to know about Android packers
Total Recall: Implanting Passwords in Cognitive Memory
The Black Art of Wireless Post Exploitation
Game of Chromes: Owning the Web with Zombie Chrome Extensions
Call the plumber - you have a leak in your (named) pipe
25 Years of Program Analysis