Penetrate your OWA
Burner Phone DDOS 2 dollars a day : 70 Calls a Minute
Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog
I am a legend: Hacking Hearthstone with machine learning
Around the world in 80 cons - A Perspective
NSA Playset: DIY WAGONBED Hardware Implant over I2C
Optical Surgery; Implanting a DropCam
Through the Looking-Glass, and What Eve Found There
You're Leaking Trade Secrets
Trojan banker turned DDoS - The bug that brought a Bank down
NSA Playset: GSM Sniffing
Open Source Fairy Dust
Catching Malware En Masse: DNS and IP Style
Dropping Docs on Darknets: How People Got Caught
Energy-efficient bcrypt cracking
Blowing up the Celly - Building Your Own SMS/MMS Fuzzer
Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering
Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System
Home Alone with localhost: Automating Home Defense
Password Topology Histogram Wear-Leveling, aka PathWell
Playing with Car Firmware or How to Brick your Car
Empowering Hackers to Create a Positive Impact
NSA Playset: PCIe
Generating ROP payloads from numbers
Android Hacker Protection Level 0
SQL-Gestalt: A MS-SQL Rootkit Framework
Elevator Hacking - From the Pit to the Penthouse
Contests Awards Ceremony
Shellcodes for ARM: Your Pills Don't Work on Me, x86
Is This Your Pipe? Hijacking the Build Pipeline.
DEF CON Closing Ceremonies