Return From The Underworld - The Future Of Red Team Kerberos
JReFrameworker: One Year Later
To Catch a Spy
Advanced Threat Hunting
Personalities disorders in the infosec community
Purple team FAIL!
Memory-Based Library Loading: Someone Did That Already.
Hidden Treasure: Detecting Intrusions with ETW
Rapid Incident Response with PowerShell
CHIRON - Home based ML IDS
Architecture at Scale – Save time. Reduce spend. Increase security.
Building a full size CNC for under $500
Building the DeathStar: getting Domain Admin with a push of a button (a.k.a. how I almost automated myself out of a job)
How to Hunt for Lateral Movement on Your Network
Windows Rootkit Development: Python prototyping to kernel level C2
Blue Team Keeping Tempo with Offense
Python Static Analysis
The Trap House
Modern Evasion Techniques
Kali Linux?
Peekaboo! I Own You. Owning Hundreds of Thousands Vulnerable Devices with only two HTTP packets
Data Mining Wireless Survey Data with ELK
Hunting for Memory-Resident Malware
C2 Channels - Creative Evasion
FM, and Bluetooth, and Wifi... Oh My!
Common Assessment Mistakes Pen Testers and Clients Should Avoid
Burping for Joy and Financial Gain
How to KickStart a Drone JailBreaking Scene
Reaching Across the Isle: Improving Security Through Partnership
Out With the Old, In With the GNU
Detect Me If You Can
Everything I Need To Know About Security I Learned From Watching Kung Fu Movies
POP POP RETN ; An Introduction to Writing Win32 Shellcode
Web Application testing - approach and cheating to win
Tracing Adversaries: Detecting Attacks with ETW
The Current State of Security, an Improv-spection
Full-Contact Recon
Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science
What A Long Strange Trip It’s Been
When IoT Research Matters
I Survived Ransomware . . . TWICE
Drone Delivered Attack Platform (DDAP)
Not a Security Boundary: Bypassing User Account Control
Reverse Engineering Hardware via the HRES
Game On! Using Red Team to Rapidly Evolve Your Defenses
I want my EIP
Mobile APTs: A look at nation-state attacks and techniques
MacOS host monitoring - the open source way
Victim Machine has joined #general: Using Third Party APIs as C&C Infrastructure.
Anatomy of a Medical Device Hack- Doctors vs. Hackers in a Clinical Simulation Cage Match
Statistics on 100 million secrets: A look at recent password dumps
Hacking VDI, Recon and Attack Methods
DFIR Redefined