Hashcat Password Cracking Methodologies

The Hacker Mindset: Unlocking the Next Generation of Hackers

Intro to Badge Hacking: Essential Tools and Techniques for Embedded Device Testing

Finding Holes in Conditional Access Policies

Building Testing Dropboxes

How to hack a cloud production environment with external Terraform manipulation

Cybersecurity Competitions: From Friendly Fire to Live Fire

Weird Ways to DA

Adware as a Service

KEYNOTE: IC (What you Did There): Managing a Career While Staying out of Management