Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Reverse Engineering Mobile Apps
Securing Boost.Beast
Twist & Shout: Ferris Bueller's Guide to Abuse Domain Permutations
Check Your Privilege (Escalation)
Network Penetration Testing Toolkit: Netcat, Nmap, and Metasploit Basics
Introduction to Linux - Privilege Escalation Methods
Pose a Threat: How Perceptual Analysis Helps Bug Hunters
Coinbase: Managing Security Through Collaboration
Change Healthcare: Securing a Competitive Advantage
Securing Mobile Security with Bluebox
Iotium: Securing an Industrial IoT Platform
Drone Hacking: Wireless Mouse Flyby Hijack with DangerDrone
Zephyr Health: Building a Healthy Security Program
Weaponizing Machine Learning
DEF CON 25 (2017) - Game of Drones
Drone Hacking: Defeating Net Defense Products with a Protective Chicken Wire Cage
Drone Hacking: SKYNET Shotgun Shells - Drone Net Shell Testing
Weaponizing Machine Learning: Humanity Was Overrated Anyway
DeepHack Demo - Exploiting SQLi by Using an Open-source Hacking AI Tool
Lord of the Bing - Search Engine Hacking
How We Can Stop Email Spoofing
Danger Drone - Arsenal DEMO
Drone Hacking: Live Footage of Danger Drone
Game Over, Man! – Reversing Video Games to Create an Unbeatable AI Player
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.