Subscribe | 28K
Applying Automated Offensive Assessments
Wild West Hackin' Fest
ELD Device Security
Aggressive Autonomous Actions - Operating with Automation
The Lexicon, Risk Management and You
Hack Dumberly Not Harderer
What Could It Hurt?
Extracting Data from Slack: Hackers Will, You Should!
Copying Keys from Photos, Molds & More
Android App Penetration Testing 101
Integrated Security Testing
Antimalware Scan Interface (AMSI)
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft "features"
Take a Break
Open Source Intelligence 101
Privilege Escalation FTW
Red Teaming in the EDR age
Using PowerUpSQL & goddi for Active Directory Information Gathering
Seriously, I Really Can Still See You.
Automating Creating Disposable & Secure Red Team Infrastructure
Passive DNS Collection and Analysis -- the ‘dnstap’ (& fstrm) Approach
Hack for Show, Report for Dough
What to Expect When You Are Expecting...a Penetration Test
Six Sick Systems, One Hour: Investigate with Host Forensics
The Top 10 Reasons It's GREAT to Be a Pen Tester... And How You Can Help Fix that PROBLEM
Wild West Hack Fest 2018
Peekaboo - I own you: Owning hundreds of thousands of devices with a broken HTTP packet
2017 Wild West Hackin' Fest Labs
I Can Still See You!
Windows Operating System Archaeology
Bitcoin At The Gates Cybersecurity & The Coming Global Financial Revolution
I'll Let Myself In: Tactics of Physical Pen Testers
What Is the Hacker Community?
Honey, Please Don’t Burn Down Your Office Further Adventures in IoT and Office Automation
0wning the network with CrackMapExec v4.0
Make Email Great Again – Lessons Learned from a Year of Malicious Emails
Building a Successful Internal Adversarial Simulation Team
The World is Y0ur$: Geolocation based Wordlist Generation with Wordsmith
The Art of the Jedi Mind Trick
Authenticated Code Execution by Design
A Flapper, a Rodeo Clown, a Cockroach and a Milkshake Walk Into a Bar
Programming with Google
Security Theme Parks: You Must Be This Tall to Ride the Internet
Extending BloodHound for Red Teamers
Domain Password Audit Tool
Certification? College?: How do you get into Cybersec really?
A Google Event You Won't Forget
Open Source Pentesting
Vapor Trail - Data Exfiltration via Faraday's Law & Ponies
Morphing to Legitimate Attack Patterns