-
Intro
- Dhillon 'L33tdawg' Kannabhiran
-
60 CVEs In 60 Days
- Eran Shimony
-
The State Of ICS Security: Then And Now
- Praveen Soni and Ashish Gahlot & Shivbihari Pandey
-
Pwning Adobe Reader Multiple
Times With Malformed Strings
- Ke Liu
-
Open The Gates:
The (In)security Of Cloudless Smart Door Systems
- Jorg Schneider and Sebastian Neef & Julian Beier
-
Hiding In Plain Sight:
Analyzing Recent Evolutions In Malware Loaders
- Holger Unterbrink & Edmund Brumaghin
-
Building Next-Gen Security Analysis Tools With Qiling Framework
- Lau Kai Jern & Simone Berni
-
Exploiting Directory Permissions On Macos
- Csaba Fitzl
-
Documents Of Doom:
Infecting Macos Via Office Macros
- Patrick Wardle
-
From Man-in-the-Middle To PrivEsc And RCE:
Exploiting The Netlogon Protocol
- Tom Tervoort
-
The DNA Of Hidden Cobra: A Look At A
Nation State's Cyber Offensive Programs
- Ryan Sherstobitoff
-
Prisoner Number 6
- Nimrod Stoler
-
Fuzzing File System Implementations
To Uncover Security Bugs
- Christopher Krah
-
Breaking And Securing Cloud Platforms
- Fyodor Yarochkin
-
Army Of Undead:
Tailored Firmware Emulation
- Thomas Weber
-
Bugrank: A Community Bug Bounty Platform
- Thanh 'Red Dragon' Nguyen and Anthony Lai & Nguyen Anh Quynh
-
Firmware Hacking With Ghidra
- Thomas Roth & Dmitry Nedospasov