Home Blog Posts and Conference Talks
Post
Cancel

Blog Posts and Conference Talks

Blog Posts

How to Build Your Own Caller ID Spoofer: Pt 1

How to Build Your Own Caller ID Spoofer: Pt 2

Nerds in the NERC

The Pizza of Doom

I’m Calling my Lawyer!

Hacking a Self-Driving Car

Rapid7 Under the Hoodie: 2020

Grafana and Prometheus for 3d Printing

Conference Talks

Don’t Let Your Roomba Sell Your Bank Login - BSides Austin Austin, TX 05/2023

Hacking with Logic Analyzers - DEF CON 28 Safe Mode

Make Vishing Suck Less - Layer8 Conference Newport, RI 06/2018

Make Vishing Great Again - BSides Austin Austin, TX 03/2018

IoT Sandbox: Finding Secrets in Trashed IoT - RSA Conference 2020 Sandbox San Francisco, CA 

DEF CON 26, 27, 28 IoT Village - Coordinated and oversaw hardware exercises  Las Vegas, NV

Rapid7 Under the Hoodie

The Pizza of Doom

The Power Plant

This post is licensed under CC BY 4.0 by the author.

Deploy Network Log Monitoring: Part Deux

-

\

Comments powered by Disqus.