The Cavalry Isn't Coming: Starting the Revolution to Fsck it All!
gitDigger: Creating useful wordlists from public GitHub repositories
Exploiting Music Streaming with JavaScript
Defense by numbers: Making problems for script kiddies and scanner monkeys
Made Open: Hacking Capitalism
The Dark Arts of OSINT
Java Every-Days: Exploiting Software Running on 3 Billion Devices
Resting on Your Laurels will get you Pwned: Effectively Code Reviewing REST Applications to avoid getting powned
LAZZORS! PEW! PEW!
The dawn of Web 3.0: website mapping and vulnerability scanning in 3D, just like you saw in the movies
EMET 4.0 PKI Mitigation
Combatting Mac OSX/iOS Malware with Data Visualization
HiveMind: Distributed File Storage Using JavaScript Botnets
This presentation will self-destruct in 45 minutes: A forensic deep dive into self-destructing message apps
Strange interactions in personal data: Brokers and the CFAA
A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading
Stepping P3wns: Adventures in full spectrum embedded exploitation (and defense!)
Transcending Cloud Limitations by Obtaining Inner Piece
Defending Networks with Incomplete Information: A Machine Learning Approach
Fast Forensics Using Simple Statistics and Cool Tools
The Continued Rise of Idiocracy: CCSS, PBI and other education acronyms that nobody understands
Utilizing Popular Websites for Malicious Purposes Using RDI
EDS: Exploitation Detection System
Open Public Sensors, Trend Monitoring and Data Fusion
Blucat: Netcat For Bluetooth
Forensic Fails - Shift + Delete won't help you here
Network Survival WCS
Collaborative Penetration Testing With Lair
Conducting massive attacks with open source distributed computing
PowerPwning: Post-Exploiting By Overpowering PowerShell
BYOD PEAP Show
Let's screw with nmap
Owning Management with Standards
Evolving Exploits Through Genetic Algorithms
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions
The Bluetooth Device Database
C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood
Challenges being a criminal defense digital forensics expert
Closing Ceremonies