All-in-one-Recon-by_@1ndianl33t
VirSecCon-All-in-one-slides-by_@1ndianl33t
The Bug Hunter’s Methodology v4 Recon
Who, What, Where, When, Wordlist
Owning Online Games with only web hacking Experience
Practical Attacks using Http Request Smuggling
JWT: jku x5u attacking json web tokens
Intrigue Core – Scaling Assessment Automation (NahamCon Presentation)