1.2. Mobile phone networks
1.1. Intro Whoareus
1.3. (In)security Software
7.3. iCloud keychain-2
3.1. Face recognition
4.4. Hashcracking server on generic hardware
2.2. Introduction to Arduino
5.2. Digital forensics
7.5. Pwnie express IRL
2.1. Dissecting blackberry
4.1. Path traversal post_exploitation
2.3. Java cracking random_utils
7.4. Show impact [bug bounties]
6. [Bonus] DCM MI6
6.3. How to get out of an inprivacy jail
7.1. SDLC try me to implenment
6.4. PHD IV CTF final
6.1. iCloud keychain and iOS 7 data protection
3.3. Database honeypot
3.2. White hat