Scanning Darkly
Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World
Look Ma, No Exploits! – The Recon-ng Framework
Practical Exploitation Using A Malicious Service Set Identifier (SSID)
JTAGulator: Assisted discovery of on-chip debug interfaces
Seeing red in your future?
TMI: How to attack SharePoint servers and tools to make it easier
The High Risk of Low Risk Applications
It’s Okay to Touch Yourself
Collaborative Penetration Testing With Lair
Malware Automation
What’s common in Oracle and Samsung? They tried to think differently about crypto.
Burning the Enterprise with BYOD
Getting the goods with smbexec
Shattering the Glass: Crafting Post Exploitation Tools with PowerShell
Cheat Codez: Level UP Your SE Game
My Experiments with truth: a different route to bug-hunting
The Art and Science of Hacking Any Organization
Living Off the Land: A Minimalist’s Guide to Windows Post-Exploitation
Cracking Corporate Passwords – Exploiting Password Policy Weaknesses
Ownage From Userland: Process Puppeteering
‘) UNION SELECT `This_Talk` AS (‘New Exploitation and Obfuscation Techniques’)%00
Exploiting_the_Zeroth_Hour(); Developing your Advanced Persistent Threat to Pwn the Network
Phishing Like The Pros
Raspberry Pi, Media Centers, and AppleTV