1 |
2021 Conference Talks |
2 |
Purple Team Tactics: Simulating Supply Chain Attacks With DLL Hijacking |
3 |
2020 Conference Talks |
4 |
Live off the Land and Crack the NTLMSSP Protocol |
5 |
Red Team Tradecraft: Loading Encrypted C# Assemblies In Memory |
6 |
Hooking Linux Libraries for Post-Exploitation Fun |
7 |
Finding a Decade-Old Flaw in GNU Mailutils |
8 |
Modifying Empire to Evade Windows Defender |
9 |
Fax Vulnerability May Have Lasting Effects for Small Businesses |
10 |
Multiple Flaws Uncovered in Pydio 8 |
11 |
S3 Buckets: Now With Both Leak & Fill Vulnerability |
12 |
Stealing Data With CSS: Attack and Defense |
13 |
Model Radio Tower using 555 Timer and Lego Bricks |
14 |
Move Over S3: Open Directory Indexes Continue to be a Problem |
15 |
xterm can talk (001): Amazon Delivery |
16 |
Security Researchers Lose a Favorite DNS Recon Tool Jan 2018 |
17 |
KRACK: How To Protect Yourself on a Flawed Network |
18 |
iOS Credential Phishing 'Flaw' Not Limited to Malicious Apps |
19 |
Equifax, SEC, & Now Deloitte: Organizations Must Employ Offensive Security |
20 |
Equifax Redux Part 1: Assume You Are Already Compromised |
21 |
Chaining Remote Web Vulnerabilities to Abuse Let's Encrypt |
22 |
makeRF: Ten Minute Transmitter |
23 |
Build a Raspberry Pi Powered Arcade Machine! |
24 |
Build an Arduino Word Clock |
25 |
Check Out My New Site: makeRF.com |
26 |
Hacking My House #1.5: When Lightning Rings |
27 |
Hacking My House #1: Building a Musical Arduino Doorbell |
28 |
Moving Your Landline To Google Voice |