AutoRepeater: Automated HTTP Request Repeating With Burp Suite
BinDbg: Easy Windows Debugging for Binary Ninja
Building the Panopticon: Centralized Logging and Alerting With Free Tools
Civic and Humanitarian Open Source
Closing Remarks
Detect Me If You Can
Ducky-in-the-middle: Injecting keystrokes into plaintext protocols
Easily Deploying and Optimizing Open Source Web Application Firewalls
How the Cookie Crumbles: Modern HTTP State Persistence
How to "hack" point of sale systems
IoT 4n6: The Growing Impact of the Internet of Things on Digital Forensics
IoT Botnet Detection System using Machine Learning
IoT Devices - And why they desperately need help.
Keynote
Learn How to Expect the Unexpected: Unusual & Unexpected Findings in Incident Response
Lightning Talks
Opening Remarks
Open source SAST and DAST tools for web app pen testing
Pentesting DevOps: Attacking Containers and Container Orchestration
Red and Blue Ping Pong
Rise of the Miners
Sentry or: How I Learned to Stop Worrying and Delete My Accounts
Top SIEM Rules You Should Implement Today
Turning Domain Data into Domain Intelligence
Virtualization Based Security Strengths and Weaknesses