How Not to Infosec
Python for InfoSec
Dog the Freaking (OSINT) Bounty Hunter - Helping Law Enforcement Catch Criminals For (Mostly) Fun - And (Probably No) Profit
Current Trends in Computer Law
Spanking the Monkey (or How Pentesters Can Do It Better!)
On Defending Against Doxxing
Practical Windows Kernel Exploitation
Hijacking Label Switched Networks in the Cloud
Hacking for Homeschoolers
Going AUTH the Rails on a Crazy Train
Bugspray - The 802.15.4 Attack Surface
Unbillable: Exploiting Android in App Purchases
Bypass Surgery: Abusing Content Delivery Networks With Server-Side-Request Forgery (SSRF), Flash, and DNS
Dynamic Analysis of Flash Files
Attacking Packing: Captain Hook Beats Down on Peter Packer
HFC Update
HARdy HAR HAR HAR: HAR File Collection and Analysis for Malware
PHaaS - Phishing as a Service
Circles & Boxes - Drawing SecArch into Your Program
Disecting Wassenaar
Five Hardware Hacking Projects Under $30
Confessions of a Crypto Cluster Operator