Pwning People Personally
OSINT for AppSec: Recon-ng and Beyond
Mobile Application Reverse Engineering: Under the Hood
Hacking for Homeschoolers
Stacking the Virtual Deck: Attacks by Predicting RNGs
Homebrewing for Hackers
Stagefright: Scary Code in the Heart of Android
Hacking Virtual Appliances
Introducing the RITA VM: Hunting for Bad Guys on Your Network For Free with Math.
Going AUTH the Rails on a Crazy Train
Stealthy and Persistent Back Door for Z- Wave Gateways
Building a Better Honeypot Network
Dec0ding Humans Live
ISLET: An Attempt to Improve Linux-based Software Training
Breaking in Bad (I’m The One Who Doesn’t Knock)
Bugspray - The 802.15.4 Attack Surface
Surveillance Using Spare Stuff
Crypto 101: An Intro to Real-World Crypto
Gray Hat PowerShell
CyberSecurity Alphabets - Hacker Edition
Developers: Care and Feeding
Unbillable: Exploiting Android in App Purchases
Practical Attacks Against Multifactor
Hacking the Next Generation
WhyMI so Sexy? WMI Attacks - Real-Time Defense - and Advanced Forensic Analysis
Losing Battles - Winning Wars - Active Defense Rebooted
Fingerprinting the Modern Digital Footprint
Bypass Surgery: Abusing Content Delivery Networks With Server-Side-Request Forgery (SSRF), Flash, and DNS
The Human Interface Device Attack Vector: Research and Development
A Survey of Powershell Enabled Malware
Hackers vs. Defenders: Can the Defender Ever Stop Playing Catch Up and Win?
Social Media Risk Metrics. When OMGWTFBBQ Meets Risk Algorithms.
Surviving Your Startup
Dynamic Analysis of Flash Files
Tool Drop: Free as in Beer
Tactical Diversion-Driven Defense
Medical Devices: Pwnage and Honeypots
Building a Brain for Infosec
Started from the bottom, now I’m here?: How to ruin your life by getting everything you ever wanted
Attacking Packing: Captain Hook Beats Down on Peter Packer
Windows 10 Defense in Depth
Latest Tools in Automotive Hacking
State of the Metasploit Framework
How to Build Your Own Covert SIGINT Vehicle
Using Windows diagnostics for system compromise
HFC Update
Ansible. And Why it Works for Me.
Learning Mainframe Hacking: Where the Hell Did All My Free Time Go?
Credential Assessment: Mapping Privilege Escalation at Scale
InfoSec Big Picture and Some Quick Wins
HARdy HAR HAR HAR: HAR File Collection and Analysis for Malware
Intercepting USB Traffic for Attack and Defense
Geeks Need Basements!
Intro to x86
Spy Vs. Spy: How to Use Breakable Dependencies to Your Advantage