Interceptor: A PowerShell SSL MITM Script
Attack Paths
Hackers Are People Too
Making Mongo Cry-Attacking NoSQL for Pen Testers
Human Trafficking in the Digital Age
Cat Herding in the Wild Wild West: What I Learned Running A Hackercon CFP
More New Shiny in the Metasploit Framework
How to Secure and Sys Admin Windows like a Boss.
Ethical Control: Ethics and Privacy in a Target-Rich Environment
Step On In, The Waters Fine!
How to Stop a Hack
We don’t need no stinking Internet.
All Your Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches
Red white and blue. Making sense of Red Teaming for good.
The Road to Compliancy Success Plus Plus
Give me your data! Obtaining sensitive data without breaking in
Hacking the media for fame and profit
The Human Buffer Overflow aka Amygdala Hijacking
Around the world in 80 cons
Are You a Janitor- Or a Cleaner
Third Party Code: FIX ALL THE THINGS
ZitMo NoM
Penetrate your OWA
Shellcode Time: Come on Grab Your Friends
Mirage — Next Gen Honeyports
Practical PowerShell Programming for Professional People
Just What The Doctor Ordered?
RavenHID: Remote Badge Gathering -or- Why we sit in client bathrooms for hours
Interns Down for What?
The Internet Of Insecure Things: 10 Most Wanted List
They touched you WHERE? When trusting a security questionnaire isn’t enough!
GROK
Powershell Drink the Kool-Aid
i r web app hacking (and so can you!)
Building a Modern Security Engineering Organization
DDoS Botnet: 1000 Knives and a Scalpel!
Active Directory: Real Defense for Domain Admins
How building a better hacker accidentally built a better defender
powercat
Information Security Team Management: How to keep your edge while embracing the dark side
5min web audit: Security in the startup world
wifu^2
The Wireless World of the Internet of Things
Exploring Layer 2 Network Security in Virtualized Environments
Macro Malware Lives! -- Putting the sexy back into MS-Office document macros
Project SCEVRON: SCan EVrything with ruby RONin
Soft Skills for a Technical World
Attacking Microsoft Kerberos: Kicking the Guard Dog of Hades
Hardware Tamper Resistance: Why and How?
Girl… Fault Interrupted
Gone in 60 minutes -- Practical Approach to Hacking an Enterprise with Yasuo
Snarf - Capitalizing on Man-in-the-Middle
Electronic locks in firearms -- Oh My!