InfoSec Philosophies for the Corrupt Economy |
Black Hat USA 2018
|
COMMSEC: 2FAssassin: Bypass 2FA, Stealing Private Keys, and More |
HITB GSEC 2017 – Singapore
|
2-DAY TECH TRAINING 3 – Linux Kernel Exploitation Techniques |
HITBSecConf2017 – Amsterdam
|
Understanding HTTP/2 |
RSAC USA 2016
|