Eye on the Prize
Building Better Backdoors with WMI
Beyond xp_cmdshell
Bots, Trolls, and Warriors
Building Google for Criminal Enterprises
V!4GR4: Cyber-Crime, Enlarged
The skills gap: how can we fix it?
Extending Burp
Shellcode Via VBScript/JScript Implications
Retail Store/POS Penetration Testing
Improv Comedy as a Social Engineering Tool
How to safely conduct shenanigans
The .NET Inter-Operability Operation
A presentation or presentations because...
Personalities disorders in the infosec community
Purple team FAIL!
Architecture at Scale – Save time. Reduce spend. Increase security.
Building a full size CNC for under $500
Python Static Analysis
The Trap House
Hunting for Memory-Resident Malware
C2 Channels - Creative Evasion
Reaching Across the Isle: Improving Security Through Partnership
Out With the Old, In With the GNU
Tracing Adversaries: Detecting Attacks with ETW
The Current State of Security, an Improv-spection
I Survived Ransomware . . . TWICE
Drone Delivered Attack Platform (DDAP)
Mobile APTs: A look at nation-state attacks and techniques
MacOS host monitoring - the open source way
Statistics on 100 million secrets: A look at recent password dumps
Hacking VDI, Recon and Attack Methods
DFIR Redefined
Introducing SpyDir - a BurpSuite Extension
Phishing for You and Your Grandma!
Regular Expressions (Regex) Overview
Securing Your Network
Diary of a Security Noob
Spy vs. Spy - Tip from the trenches for red and blue teams
changeme: A better tool for hunting default creds