Bypassing MacOS Detections With Swift
IPv6 Security Considerations - For When "Just Turn It Off" Isn't Good Enough
Offensive Machine Learning for Pentesters and Red Teams
SCADA: What the next Stuxnet will look like and how to prevent it
Designing & building a stealth C2 LDAP channel
There's No Place like (DUAL)Homed.
Modlishka - Is a Mantis Eating 2FA's Lunch?
Hacking Humans: Addressing Vulnerabilities in the Advancing Medical Device Landscape
It Must Be Fancy Bear!
Getting the most out of your covert physical security assessment - A Client’s Guide
Getting dirty on the CANBUS
Automated Dylib Hijacking
Phishing past Mail Protection Controls using Azure Information Protection (AIP)
The $19.95 anonymous cyber profile
Prepare to Be Boarded! A Tale of Kubernetes, Plunder, and Cryptobooty
Build your own multi-user password manager using open source software
No class, Low Tech, High damage
Early Detection Through Deception
The quest for 10g IDS
Swagger Defense
Kerberoasting Revisited
Hacking While Blind.
Choose Your Own TTX: Redefining the Incident Response Table Top Exercise
Hunting Phish Kits
One woman's journey to CISO leveraging Social Engineering
SharPersist: Windows Persistence Toolkit in C#
Are you ready to leverage DevSecOps? Get ready and use it for good.
Shadow IT in the Cloud
.NET Manifesto - Win Friends and Influence the Loader
Confessions of an IT / OT Marriage Counselor
Python Two birds with one stone
Invoke-GreatBirdOfCommonKnowledge - Gathering what is scattered with ATT&CK, an Atomic Bird, and a bit of homegrown PowerShell...
Adventures in systemd injection
Frag, You're It - Hacking Laser Tag
Waking up the data engineer in you!
Old Tools, New Tricks: Hacking WebSockets
Endpoint Detection Super Powers on the cheap, with Sysmon
Still More Quiet Time
Automating Hashtopolis
Social Engineering in Non-Linear Warfare
How to cook a five star meal from the convenience of your hotel room
Virtual Smart Cards for Lab Environments