Welcome to the Family
Saving the world from the zombie apocalypse
How to Give the Best Pen Test of Your Life
Back by popular demand -- Adaptive Penetration Testing Part Two
If it fits- it sniffs: Adventures in WarShipping
Threat Modeling for Realz
So You Want To Murder a Software Patent
Subverting ML Detections for Fun and Profit
NeXpose For Automated Compromise Detection
A girl, some passion, and some tech stuff
Abusing Active Directory in Post-Exploitation
A Guided Tour of the Internet Ghetto :: Introduction to Tor Hidden Services
Patching the Human Vulns
Secrets of DNS
InfoSec -- from the mouth of babes (or an 8 year old)
Why Aim for the Ground?
Quantifying The Adversary: Introducing GuerillaSearch and GuerillaPivot
Red Teaming: Back and Forth, 5ever
Burp For All Languages
Snort & OpenAppID: How to Build an Open Source Next Generation Firewall
NoSQL Injections: Moving Beyond ‘or ‘1’=’1′
SWF Seeking Lazy Admin for Cross Domain Action
A Year in the (Backdoor) Factory
How not to suck at pen testing
Passing the Torch: Old School Red Teaming- New School Tactics
GET A Grip on Your Hustle: Glassdoor Exfil Toolkit
Planning for Failure
The Social Engineering Savants -- The Psychopathic Profile
Ball and Chain (A New Paradigm in Stored Password Security)
Mainframes, Mopeds and Mischief: A PenTester's Year in Review
I Am The Cavalry: Year [0]
DNS-Based Authentication of Named Entities (DANE): Can we fix our broken CA model?
Hiding the breadcrumbs: Forensics and anti-forensics on SAP systems
You’re in the butter zone now- baby.
Et tu- Kerberos?
The Multibillion Dollar Industry That’s Ignored
University Education In Security Panel
Exploiting Browsers Like A Boss w/ WhiteLightning!
Making BadUSB Work For You
PassCrackNet: When everything else fails- just crack hashes.
Advanced Red Teaming: All your Badge Are Belong To Us
Code Insecurity or Code in Security
What happened to the ‘A’? How to leverage BCP/DR for your Info Sec Program
Real World Intrusion Response
Vulnerability Assessment 2.0
Social Engineering your progeny to be hackers
Bypassing Internet Explorer’s XSS Filter
C3CM: Defeating the Command- Control- and Communications of Digital Assailants
Securing Your A$$ets from Espionage
Application Whitelisting: Be Careful Where The Silver Bullet Is Aimed
A Brief History of Exploitation
Hunting Malware on Linux Production Servers: The Windigo Backstory