Metasploit Townhall
Stagefright: An Android Exploitation Case Study
Rotten Potato - Privilege Escalation from Service Accounts to SYSTEM
DevOops Redux
.... and bad mistakes I've made a few.....
Better Network Defense Through Threat Injection and Hunting
It’s Never So Bad That It Can’t Get Worse
From Commodity to Advanced (APT) malware, are automated malware analysis sandboxes as useful as your own basic manual analysis?
Business Developement: The best non-four letter dirty word in infosec.
Point of Sale Voyuer - Threat Actor Attribution Through POS Honeypots
Anti-Forensics AF
Penetration Testing Trends
Using Binary Ninja for Modern Malware Analysis
Scripting Myself Out of a Job - Automating the Penetration Test with APT2
DNS in Enterprise IR: Collection, Analysis and Response
Reverse engineering all the malware...and why you should stop.
The 90's called, they want their technology back
Poetically Opaque (or other John Updike Quotes)
Java RATS: Not even your Macs are safe
Hashview, a new tool aimed to improve your password cracking endeavors.
Static PIE: How and Why