Aiding Static Analysis: Discovering Vulnerabilities in Binary Targets through Knowledge Graph Inferences
IDAPython: The Wonder Woman of Embedded Device Reversing
Windows Event Logs -- Zero 2 Hero
EDR, ETDR, Next Gen AV is all the rage, so why am I enraged?
Introducing SpyDir - a BurpSuite Extension
Phishing for You and Your Grandma!
Evading Autoruns
Love is in the Air - DFIR and IDS for WiFi Networks
Gone In 59 Seconds - High Speed Backdoor Injection via Bootable USB
Kinetic to Digital: Terrorism in the Digital Age
Regular Expressions (Regex) Overview
Securing Your Network
MitM Digital Subscriber Lines
Going Deep and Empowering Users - PCAP Utilities and Combating Phishing in a new way
SniffAir – An Open-Source Framework for Wireless Security Assessments
Hacking Blockchains
Diary of a Security Noob
Spy vs. Spy - Tip from the trenches for red and blue teams
Jumping the Fence: Comparison and Improvements for Existing Jump Oriented Programming Tools
We're going on a Threat Hunt, Gonna find a bad-guy.
Become the Puppet Master - the battle of cognition between man and machine
Winning (and Quitting) the Privacy Game: What it REALLY takes to have True Privacy in the 21st Century; or How I learned to give in and embrace EXIF tags
changeme: A better tool for hunting default creds
Closing Ceremony