Search results
  1. 28 May 2015

    "A good exploit is one that is delivered with style" Stegosploit Speech by

  2. 30 May 2015
  3. 29 May 2015

    Final keynote by at about security and privacy. Many journalists should have seen it

  4. 29 May 2015

    afterparty was fun again, people still look at you when walking around with a big cheque.

  5. Amazingly done logo for “Breaking Bad Crypto” by . Come learn how to tear cryptosystems apart at

  6. 27 May 2015

    Finally at Hack In the Croquette :)

  7. Totally the coolest - I've got my iphone 6 signed by and at

  8. 27 May 2015
  9. 30 May 2015

    By just looking at the material, Exploiting Browsers the Logical Way - - was probably a nice talk

  10. 29 May 2015

    Interesting presentation "Pentesting in the Age of IPv6"

  11. 28 May 2015

    Generating hash collisions In the lab with at

  12. 28 May 2015

    "If you can't trust your firmware, you can't trust anything. Yet no one thinks it's important to patch or integrity check it."

  13. 29 May 2015
  14. 29 May 2015
  15. 20 May 2015

    Hey mobile security guys! There are seats left in our iOS exploitation training at :

  16. 29 May 2015
  17. 28 May 2015
  18. 50 USB armory kits packed for , slides done, we are ready for Amsterdam! :)

  19. 29 May 2015

    [PDF] "....~95%*of analyzed Windows Phone apps lack proper binary protections...."

  20. 28 May 2015

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.