Payload Already Inside: Data Re-Use for ROP exploits
Aleatory Persistent Threat
Hacking Java Clients
Harder, Better, Faster, Stronger: Semi-Auto Vulnerability Research
SAP Backdoors: A Ghost at the Heart of Your Business
Constricting the Web: Offensive Python for Web Hackers
Utilizing Code Reuse/Return Oriented Programming in PHP Web Application Exploits
GWT Security: Don’t Get Distracted by Bright Shiny Objects
How I Met Your Girlfriend
Deconstructing ColdFusion