Invoke-EmpireHound - Merging BloodHound & Empire for Enhanced Red Team Workflow
When Macs Come Under ATT&CK
Abusing IoT Medical Devices For Your Precious Health Records
Detecting WMI exploitation
Gryffindor | Pure JavaScript, Covert Exploitation
Instant Response: Making IR faster than you thought possible!
VBA Stomping - Advanced Malware Techniques
Media hacks: an Infosec guide to dealing with journalists
Deploying Deceptive Systems: Luring Attackers from the Shadows
The Money-Laundering Cannon: Real cash; Real Criminals; and Real Layoffs
Perfect Storm: Taking the Helm of Kubernetes
How to put on a Con for Fun and (Non) Profit
Web app testing classroom in a box - the good, the bad and the ugly
Metasploit Town Hall 0x4
Community Based Career Development or How to Get More than a T-Shirt When Participating as part of the Community
Goodbye Obfuscation, Hello Invisi-Shell: Hiding Your Powershell Script in Plain Sight
Cloud Forensics: Putting The Bits Back Together
Killsuit: The Equation Group's Swiss Army knife for persistence, evasion, and data exfil
The MS Office Magic Show
Living off the land: enterprise post-exploitation
Hillbilly Storytime: Pentest Fails