Introducing PowerShell into your Arsenal with PS>Attack
Recharging Penetration Testing to Maximize Value
Poetically Opaque (or other John Updike Quotes)
Hack Yourself: Building A Pentesting Lab
Abusing Linux Trust Relationships: Authentication Back Alleys and Forgotten Features
Samsung Pay: Tokenized Numbers, Flaws and Issues
Hardening AWS Environments and Automating Incident Response for AWS Compromises
Yara Rule QA: Can't I Write Code to do This for Me?
Java RATS: Not even your Macs are safe
The Advanced Persistent Pentester (All Your Networks Are Belong 2 Us)
Fire Away! Sinking the Next Gen Firewall
Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To) D""e`Tec`T 'Th'+'em'
Mobile Device Forensics
Hashview, a new tool aimed to improve your password cracking endeavors.
Hardware Hacking the Easyware Way
PacketKO - Data Exfiltration Via Port Knocking
Ransomware: An Overview
MariaDB: Lock it down like a chastity belt
IoT Defenses - Software, Hardware, Wireless and Cloud
Static PIE: How and Why
Finding a Weak Link: Attacking Windows OEM Kernel Drivers
The Beginner's Guide to ICS: How to Never Sleep Soundly Again
Closing Ceremony