Building an Empire with (Iron)Python
Hardware Slashing, Smashing, and Reconstructing for Root access
VBA Stomping - Advanced Malware Techniques
Disaster Strikes: A Hacker's Cook book
Tales From the Bug Mine - Highlights from the Android VRP
Decision Analysis Applications in Threat Analysis Frameworks
SAEDY: Subversion and Espionage Directed Against You
App-o-Lockalypse now!
Media hacks: an Infosec guide to dealing with journalists
Ninja Looting Like a Pirate
How Russian Cyber Propaganda Really Works
Make Me Your Dark Web Personal Shopper!
OSX/Pirrit - Reverse engineering mac OSX malware and the legal department of the company who makes it
Web App 101: Getting the lay of the land
Deploying Deceptive Systems: Luring Attackers from the Shadows
Hacking Mobile Applications with Frida
Driving Away Social Anxiety
Off-grid coms and power
How to test Network Investigative Techniques(NITs) used by the FBI
Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation)
The Money-Laundering Cannon: Real cash; Real Criminals; and Real Layoffs
Victor or Victim? Strategies for Avoiding an InfoSec Cold War
CTFs: Leveling Up Through Competition
Mapping wifi networks and triggering on interesting traffic patterns
Cloud Computing Therapy Session
WE ARE THE ARTILLERY: Using Google Fu To Take Down The Grids
Perfect Storm: Taking the Helm of Kubernetes
Ubiquitous Shells
Extending Burp to Find Struts and XXE Vulnerabilities
Introduction to x86 Assembly
Silent Compromise: Social Engineering Fortune 500 Businesses
Just Let Yourself In
How to put on a Con for Fun and (Non) Profit
99 Reasons Your Perimeter Is Leaking - Evolution of C&C
Pacu: Attack and Post-Exploitation in AWS
An Inconvenient Truth: Evading the Ransomware Protection in Windows 10
Dexter: the friendly forensics expert on the Coinbase security team
A “Crash” Course in Exploiting Buffer Overflows (Live Demos!)
Web app testing classroom in a box - the good, the bad and the ugly
Ship Hacking: a Primer for Today’s Pirate
Brutal Blogging - Go for the Jugular
RID Hijacking: Maintaining Access on Windows Machines
Going on a Printer Safari – Hunting Zebra Printers
Living in a Secure Container, Down by the River
Metasploit Town Hall 0x4
Code Execution with JDK Scripting Tools & Nashorn Javascript Engine
Your Training Data is Bad and You Should Feel Bad
So many pentesting tools from a $4 Arduino
Community Based Career Development or How to Get More than a T-Shirt When Participating as part of the Community
PHONOPTICON - leveraging low-rent mobile ad services to achieve state-actor level mass surveillance on a shoestring budget