ADVANCED CHROME EXTENSION EXPLOITATION - LEVERAGING API POWERS FOR THE BETTER EVIL
LINUX INTERACTIVE EXPLOIT DEVELOPMENT WITH GDB AND PEDA
FROM THE IRISCODE TO THE IRIS: A NEW VULNERABILITY OF IRIS RECOGNITION SYSTEMS
THE DARK ART OF IOS APPLICATION HACKING
RUBY FOR PENTESTERS: THE WORKSHOP