Battery Firmware Hacking
Advanced Penetration Techniques for the non-technical n00b
A Tribute to Dr. Strangelove
Win32 Exploit Development With Mona and the Metasploit Framework
Steal Everything, Kill Everyone, Cause Total Financial Ruin! (Or How I Walked In And Misbehaved)
The Hidden XSS – Attacking the Desktop
Collecting Underpants To Win Your Network
State of the Framework Address
Blue team is sexy — refocusing on defense — Part II — All you baseline are belong to us
Social Engineering is a Fraud
Advanced Nmap Scripting: Make Nmap work for you!
Why InfoSec Practitioners Are Failing
Infectious Media – Bypassing AutoRun once and for all
Distinguishing Lockpicks: Raking vs Lifting vs Jiggling and More
OpenWIPS-ng
Desktop Betrayal: Exploiting Clients through the Features They Demand
Dirty Red Team tricks
Exploiting Java Memory Corruption Vulnerabilities
Closing Ceremony