Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Network Penetration Testing Toolkit: Netcat, Nmap, and Metasploit Basics
Introduction to Linux - Privilege Escalation Methods
Pose a Threat: How Perceptual Analysis Helps Bug Hunters
Coinbase: Managing Security Through Collaboration
Change Healthcare: Securing a Competitive Advantage
Securing Mobile Security with Bluebox
Iotium: Securing an Industrial IoT Platform
Drone Hacking: Wireless Mouse Flyby Hijack with DangerDrone
Zephyr Health: Building a Healthy Security Program
Weaponizing Machine Learning
DEF CON 25 (2017) - Game of Drones
Drone Hacking: Defeating Net Defense Products with a Protective Chicken Wire Cage
Drone Hacking: SKYNET Shotgun Shells - Drone Net Shell Testing
Weaponizing Machine Learning: Humanity Was Overrated Anyway
DeepHack Demo - Exploiting SQLi by Using an Open-source Hacking AI Tool
Lord of the Bing - Search Engine Hacking
How We Can Stop Email Spoofing
Danger Drone - Arsenal DEMO
Drone Hacking: Live Footage of Danger Drone
Game Over, Man! – Reversing Video Games to Create an Unbeatable AI Player
If You Can't Break Crypto, Break the Client
Bypass Surgery - Abusing CDNs with SSRF Flash and DNS
RFIDiggity - Pentester Guide to Hacking HF/NFC and UHF RFID
Brink's Smart Safe Hacking
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.