Go with the Flow: Get Started with Flow Analysis Quickly and Cheaply
Abusing RTF: Evasion, Exploitation and Counter Measures
Information Security Proposed Solutions Series - 1. Talent
DNSSUX: Why DNSSEC Makes Us Weaker
Nose Breathing 101: A Guide to Infosec Interviewing
Android Patchwork: Convincing Apps to Do What You Want Them To
Is that a penguin in my Windows?
Real World Attacks VS Check-box Security
ARRR Maties! A map to the legal hack-back
Project MVP - Hacking and Protecting SharePoint
Responder for Purple Teams
Metaprogramming in Ruby and doing it wrong.
Evolving your Office's Security Culture
Confronting Obesity in Infosec
BurpSmartBuster - A smart way to find hidden treasures
Advanced Persistent Thirst (APT)
We're a Shooting Gallery, Now What?
Malicious Office Doc Analysis for EVERYONE!
The 1337 Gods of Geek Mythology -
Open Source Intelligence - What I learned by being an OSINT creeper
Finding Your Balance
Hashcat State of the Union
Establishing A Foothold With JavaScript
Overcoming Imposter Syndrome (even if you?re totally faking it)
Security v. Ops: Bridging the Gap
From Gaming to Hacking The Planet
SQL Server Hacking on Scale using PowerShell
Dive into DSL: Digital Response Analysis with Elasticsearch
Making Our Profession More Professional
How are tickets paid for?
Security Automation in your Continuous Integration Pipeline
Cruise Ship Security OR Hacking the High Seas
Web Security for Dummies
I Love myBFF (Brute Force Framework)
Nobody gets fired by choosing IBM... but maybe they should.
Shackles, Shims, and Shivs - Understanding Bypass Techniques
Abusing Linux Trust Relationships: Authentication Back Alleys and Forgotten Features
Samsung Pay: Tokenized Numbers, Flaws and Issues
Fire Away! Sinking the Next Gen Firewall
PacketKO - Data Exfiltration Via Port Knocking
Ransomware: An Overview
The Beginner's Guide to ICS: How to Never Sleep Soundly Again