Breaking Credit Card Tokenization Without Cryptanalysis
Privileged Access Workstations (PAWs)
Business Developement: The best non-four letter dirty word in infosec.
Tool Drop 2.0 - Free As In Pizza
We're a Shooting Gallery, Now What?
Malicious Office Doc Analysis for EVERYONE!
Attacking EvilCorp: Anatomy of a Corporate Hack
Living Off the Land 2: A Minimalist's Guide to Windows Defense
Point of Sale Voyuer - Threat Actor Attribution Through POS Honeypots
The Art of War, Attacking the Organization and Raising the Defense
The 1337 Gods of Geek Mythology -
Open Source Intelligence - What I learned by being an OSINT creeper
Phishing without Failure and Frustration
I don't give one IoTA: Introducing the Internet of Things Attack Methodology
Anti-Forensics AF
Managed to Mangled: Exploitation of Enterprise Network Management Systems
Finding Your Balance
Hashcat State of the Union
New Shiny in Metasploit Framework
Hacking with Ham Radios: What I have learned in 25 years of being a ham.
Penetration Testing Trends
Garbage in, garbage out: generating useful log data in complex environments
Establishing A Foothold With JavaScript
Overcoming Imposter Syndrome (even if you?re totally faking it)
Embrace the Bogeyman: Tactical Fear Mongering for Those Who Penetrate
Introducing DeepBlueCLI, a PowerShell module for hunt teaming via Windows event logs
Using Binary Ninja for Modern Malware Analysis
Fuzzing basics...how to break software
Security v. Ops: Bridging the Gap
From Gaming to Hacking The Planet
How to Social Engineer your way into your dream job!
Attackers Hunt Sysadmins - It's time to fight back
Scripting Myself Out of a Job - Automating the Penetration Test with APT2
Hacking for Homeschoolers: STEM projects for under $20
SQL Server Hacking on Scale using PowerShell
Dive into DSL: Digital Response Analysis with Elasticsearch
Make STEHM Great Again
Python 3: It's Time
DNS in Enterprise IR: Collection, Analysis and Response
Need More Sleep? REST Could Help
Making Our Profession More Professional
How are tickets paid for?
Breaking Android Apps for Fun and Profit
So You've Inherited a Security Department, Now What?
Reverse engineering all the malware...and why you should stop.
Body Hacking 101 (or a Healthy Lifestyle for Security Pros)
Security Automation in your Continuous Integration Pipeline
Cruise Ship Security OR Hacking the High Seas
Attacking ADFS Endpoints with PowerShell
The 90's called, they want their technology back
Web Security for Dummies
I Love myBFF (Brute Force Framework)
Nobody gets fired by choosing IBM... but maybe they should.
Shackles, Shims, and Shivs - Understanding Bypass Techniques