I Can Be Apple, and So Can You
From Workstation to Domain Admin: Why Secure Administration Isn't Secure and How to Fix It
MS17-010?
The Unintended Risks of Trusting Active Directory
Lessons Learned by the WordPress Security Team
IronPython... omfg
Hardware Slashing, Smashing, and Reconstructing for Root access
App-o-Lockalypse now!
Web App 101: Getting the lay of the land
Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation)
WE ARE THE ARTILLERY: Using Google Fu To Take Down The Grids
Just Let Yourself In
A “Crash” Course in Exploiting Buffer Overflows (Live Demos!)
Living in a Secure Container, Down by the River
Red Mirror: Bringing Telemetry to Red Teaming
Two-Factor, Too Furious: Evading (and Protecting) Evolving MFA Schemes
IoT: Not Even Your Bed Is Safe
Fingerprinting Encrypted Channels for Detection
On the Nose: Bypassing Huawei's Fingerprint authentication by exploiting the TrustZone
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010