Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Weaponizing Machine Learning
DEF CON 25 (2017) - Game of Drones
Drone Hacking: Defeating Net Defense Products with a Protective Chicken Wire Cage
Drone Hacking: SKYNET Shotgun Shells - Drone Net Shell Testing
Weaponizing Machine Learning: Humanity Was Overrated Anyway
DeepHack Demo - Exploiting SQLi by Using an Open-source Hacking AI Tool
Lord of the Bing - Search Engine Hacking
How We Can Stop Email Spoofing
Danger Drone - Arsenal DEMO
Drone Hacking: Live Footage of Danger Drone
Game Over, Man! – Reversing Video Games to Create an Unbeatable AI Player
If You Can't Break Crypto, Break the Client
Bypass Surgery - Abusing CDNs with SSRF Flash and DNS
RFIDiggity - Pentester Guide to Hacking HF/NFC and UHF RFID
Brink's Smart Safe Hacking
AirDroid Exploit Demo
Black Hat USA 2014 - CloudBots - Harvesting Crypto Coins like a Botnet Farmer
HOPE X (2014) - Rickrolling your neighbors with Google Chromecast
Bsides LV 2014 - Untwisting The Mersenne Twister: How I killed the PRNG
RickMote Controller - Hijacking TVs via Google Chromecast
August: Built-in Security in IoT Devices
ToorCon 15 (2013) - Rickrolling your neighbors with Google Chromecast
RFID Hacking: Over-the-head Move - Stealing Badges w Tastic RFID Thief
Microsoft BlueHat v8 - Real World Code Review
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.