DefCamp 2011 - call 2 action
Cross Site Request Forgery Attacks
Advanced data mining in my sql injections using subqueries and custom variables
DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - Android hacking techniques
DefCamp 2013 - Peering in the Soul of Hackers: HPP V2.0 reloaded
Defcamp 2013 - SSL Ripper
DefCamp 2013 - MSF Into The Worm Hole
Defcamp 2013 - Does it pay to be a blackhat hacker
NVidia CUDA for Bruteforce Attacks - DefCamp 2012
Blended Threat Concept in Web Applications - DefCamp 2012
CensorMeOrNot - P2P System of DNS Caches - DefCamp 2012
The importance of logs - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
How does a 0day work? - DefCamp 2012
Hacking beyond hacking - Forgotten Chapters - DefCamp 2012
Detecting and Defending against Advanced Persistent Threats - DefCamp 2012
Mobile networks: exploiting HTTP headers and data traffic - DefCamp 2012
DefCamp 2012 @Bucharest
Critical vulnerabilities in the online services of a romanian telephony company - DefCamp 2012