HIP19: Using Machines to exploit Machines - G. Barnhart Magen, E. Caltum
HIP19: Exploits in Wetware - R. Sell
Hack In Paris 2019 video
HIP19: IronPython... OMFG - M. Salvati
Kerberos Silver Ticket Attack Explained
HIP19: Sneaking Past Device Guard - P. Tsukerman
HIP19: Who watches the watchmen? - M. Bergman, M. Smeets
HIP19: whoami priv - show me your privileges and I will lead you to SYSTEM - A. Pierini
HIP19: Introduction to IoT Reverse Engineering - V. Di Giampietro
HIP19: DPAPI and DPAPI-NG Decrypting All Users’ Secrets and PFX Passwords - P. Januskiewicz
Dusty Evanoff - Mimikatz: I can has pazzwords?
Making NSA's PeddleCheap RAT Invisible (A/V | EDR evasion using a RAMDisk and a custom PE loader)
Empire & Mimikatz Detection by SentinelOne
34C3 - Electromagnetic Threats for Information Security
cg07 using superpowers for hardware reverse engineering joe grand
HIP19: RHme3 Hacking through failure - B. Gardiner, J. Beverley, C. Dewinter
#HITBHaxpo D2 - Reverse Engineering Custom ASICs By Exploiting Supply-Chain Leaks - Thomas Weber
#HITB2021AMS D2T1 - The Rise Of Potatoes: Priv. Esc. In Windows Services - A. Pierini & A. Cocomazzi
Rope: Bypassing Behavioral Detection of Malware with Distributed ROP-Driven Execution
Security Analysis on IOT Equipment by Building a Base Station System - XiaoHuiHui - DEF CON China 1