Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
How to Write Like It's Your Job
Sonos Makes Secure Moves with Bishop Fox
Zigbee Hacking: Smarter Home Invasion with ZigDiggity
Finding Secrets In Publicly Exposed EBS Volumes
ZigDiggity: ZigBee Hacking Toolkit
Ghost In The Browser - Broad-Scale Espionage With Bitsquatting
Wickr: How Bishop Fox Enables Wickr's Security Assurance
Reverse Engineering Mobile Apps
Securing Boost.Beast
Twist & Shout: Ferris Bueller's Guide to Abuse Domain Permutations
Check Your Privilege (Escalation)
Network Penetration Testing Toolkit: Netcat, Nmap, and Metasploit Basics
Introduction to Linux - Privilege Escalation Methods
Pose a Threat: How Perceptual Analysis Helps Bug Hunters
Coinbase: Managing Security Through Collaboration
Change Healthcare: Securing a Competitive Advantage
Securing Mobile Security with Bluebox
Iotium: Securing an Industrial IoT Platform
Drone Hacking: Wireless Mouse Flyby Hijack with DangerDrone
Zephyr Health: Building a Healthy Security Program
Weaponizing Machine Learning
DEF CON 25 (2017) - Game of Drones
Drone Hacking: Defeating Net Defense Products with a Protective Chicken Wire Cage
Drone Hacking: SKYNET Shotgun Shells - Drone Net Shell Testing
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.