
Mobile-Sec Exploitation Breakout
Mobile-Sec Exploitation Breakout, HACKTIVITY konferencia.

Windows Post-Exploitation Subverting the Core
Windows Post-Exploitation Subverting the Core, HACKTIVITY konferencia

Pentesting & Exploiting Highly Secured Enterprise Networks
Pentesting & Exploiting Highly Secured Enterprise Networks, HACKTIVITY konferencia.

Pentesting Industrial Control Systems
Pentesting Industrial Control Systems, HACKTIVITY konferencia.

Mastering Web-Attacks with Full Stack Exploitation
Mastering Web-Attacks with Full Stack Exploitation, HACKTIVITY konferencia.