Future Forests: Realistic Strategies for AD Security & “Red Forest” Architecture |
RSAC USA 2019
|
3D ACCELERATED EXPLOITATION |
OffensiveCon 2019
|
Overt Command & Control: The Art of Blending In |
BlueHat v18
|
Bicycle Day: Hacking BLE Bicycle Locks for Fun and (a Small) Profit |
HITB GSEC 2018 – Singapore
|
Hacking BLE Bicycle Locks for Fun and a Small Profit |
DEF CON 26
|
Corrupting Memory in Microsoft Office Protected-View Sandbox |
BlueHat v17
|
COMMSEC: Threat Hunting 101: Become the Hunter |
HITB GSEC 2017 – Singapore
|
Persisting with Microsoft Office: Abusing Extensibility Options |
DEF CON 25
|
Platform agnostic kernel fuzzing |
DEF CON 24
|
Becoming the Adversary—A Hacker's Perspective on Attacking an Organization |
RSAC Abu Dhabi 2015
|