Break Me
Welcome to the Family
Saving the world from the zombie apocalypse
How to Give the Best Pen Test of Your Life
Back by popular demand -- Adaptive Penetration Testing Part Two
If it fits- it sniffs: Adventures in WarShipping
Abusing Active Directory in Post-Exploitation
Quantifying The Adversary: Introducing GuerillaSearch and GuerillaPivot
A Year in the (Backdoor) Factory
Ball and Chain (A New Paradigm in Stored Password Security)
Et tu- Kerberos?
Advanced Red Teaming: All your Badge Are Belong To Us
Bypassing Internet Explorer’s XSS Filter
Interceptor: A PowerShell SSL MITM Script
More New Shiny in the Metasploit Framework
All Your Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches
The Human Buffer Overflow aka Amygdala Hijacking
Shellcode Time: Come on Grab Your Friends
The Internet Of Insecure Things: 10 Most Wanted List
DDoS Botnet: 1000 Knives and a Scalpel!
wifu^2
Attacking Microsoft Kerberos: Kicking the Guard Dog of Hades
Introducting Network-Socut: Defending The Soft Center of Your Network
Getting Windows to Play with Itself: A Pen Tester's Guide to Windows API Abuse
Offensive Safe Words -- Exploiting a Bad Dom(admins’)
Protocol Me Maybe? How to Date SCADA
Attacks and Countermeasures: Advanced Network Traffic Manipulation
What to expect when you’re expecting…a pentest
Things Being a New Parent of Twins Teaches You About Security
Closing Ceremonies