Let's play with crypto!
Hide Android applications in images
Malicious Hashing: Eve’s Variant of SHA-1
SHA-1 backdooring & exploitation
Packers
PDF secrets - hiding & revealing secrets in PDF documents
Schizophrenic files
When AES(☢) = ☠ - Episode V
When your slides read themselves: a binary inception
A binary chimera - 3 headers & 1 data body in a single file
Binary art - funky PoCs & visual docs
On giving technical presentations (a rant)
Just keep trying !
On hacking & security
Win the Cyber War! with Precognitive Heuristics technology
Fun ways to kill time
ELF101 a Linux executable walkthrough
Exploring the Portable Executable format
Messing with binary formats (live)
PE102 - a Windows executable format overview (booklet V1)