When to Test, and How to Test It
A New Take at Payload Generation: Empty-Nest
VMware Escapology: How to Houdini The Hypervisor
3rd Annual Metasploit Townhall
Purpose Driven Hunt: What do I do with all this data?
DanderSpritz: How the Equation Group's 2013 tools pwn in 2017
Defending the Cloud: Lessons from Intrusion Detection in SharePoint Online
Digital Vengeance: Exploiting the Most Notorious C&C Toolkits
To Catch a Spy
Rapid Incident Response with PowerShell
Windows Rootkit Development: Python prototyping to kernel level C2
Peekaboo! I Own You. Owning Hundreds of Thousands Vulnerable Devices with only two HTTP packets
Burping for Joy and Financial Gain
POP POP RETN ; An Introduction to Writing Win32 Shellcode
What A Long Strange Trip It’s Been
Game On! Using Red Team to Rapidly Evolve Your Defenses
Anatomy of a Medical Device Hack- Doctors vs. Hackers in a Clinical Simulation Cage Match
Windows Event Logs -- Zero 2 Hero
Gone In 59 Seconds - High Speed Backdoor Injection via Bootable USB
SniffAir – An Open-Source Framework for Wireless Security Assessments
Become the Puppet Master - the battle of cognition between man and machine