Opening Ceremonies
How to influence security technology in kiwi underpants
Panel Discussion - At a Glance: Information Security
IRS, HR, Microsoft and your Grandma: What they all have in common
I Can Be Apple, and So Can You
Invoke-EmpireHound - Merging BloodHound & Empire for Enhanced Red Team Workflow
The History of the Future of Cyber-Education
Red Teaming gaps and musings
A Process is No One: Hunting for Token Manipulation
#LOLBins - Nothing to LOL about!
From Workstation to Domain Admin: Why Secure Administration Isn't Secure and How to Fix It
When Macs Come Under ATT&CK
State of Win32k Security: Revisiting Insecure design
Fuzz your smartphone from 4G base station side
Clippy for the Dark Web: Looks Like You’re Trying to Buy Some Dank Kush, Can I Help You With That?
Everything Else I Learned About Security I Learned From Hip-Hop
MS17-010?
Abusing IoT Medical Devices For Your Precious Health Records
Offensive Browser Extension Development
Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework
Escoteric Hashcat Attacks
Hackers, Hugs, & Drugs: Mental Health in Infosec
The Unintended Risks of Trusting Active Directory
Detecting WMI exploitation
Protect Your Payloads: Modern Keying Techniques
NOOb OSINT in 30 Minutes or less!
RFID Luggage Tags, IATA vs Real Life
Android App Penetration Testing 101
Lessons Learned by the WordPress Security Team
Gryffindor | Pure JavaScript, Covert Exploitation
Jump Into IOT Hacking with the Damn Vulnerable Habit Helper Device
#LOL They Placed Their DMZ in the Cloud: Easy Pwnage or Disruptive Protection
Maintaining post-exploitation opsec in a world with EDR
Draw a Bigger Circle: InfoSec Evolves
IronPython... omfg
Instant Response: Making IR faster than you thought possible!
In-Memory Persistence: Terminate & Stay Resident Redux
Hey! I found a vulnerability – now what?
Foxtrot C2: A Journey of Payload Delivery
Ridesharks