Our selected publications
Summary of 200 pentests - what to pay attention to
The Hack Summit
Is a toothbrush an attack vector?
Cybertrust
CRTP / CRTO Certificates - Testing with or without CobaltStrike?
17 53c
Summary of 100 pentests - what to look for
BSidesWarsaw2024
Emacs via BBS
BSidesWarsaw2024
A day in the life of a pentester
17 53c
Redteaming in the back of the store
ISSA Local - Wrocław
No time windows is too small to be exploited
17 53c
Differential fuzzing 101
Oh My H@ck! 2022
Łukasz Juszczyk, Mateusz Kocielski
Łukasz Juszczyk, Mateusz Kocielski
Red teaming in the back of the store
Confidence 2022
Security Awareness in Polish
Webinar
8 Principles of Effective Security Awareness
Webinar
Anykernels meet fuzzing
SecurityBSides 2019
Social engineering attacks in practice
SecurityBSides 2019
Social engineering attacks in practice
Confidence 2019
How cybercriminals rob companies nowadays
ITCorner
Impulse 31337
What the Hack 2018
Spear Phishing - How to defend against it? Case Studies
SecurityBSides 2018
Minerva_lib
Security BSides 2018
Impulse 31337 – RCE in Quake World Server
Hacktivity
Spear Phishing - How to defend against it? Case Studies
Confidence 2018
Red Teaming in Poland
x33fCon
Red Teaming w Polsce
SEMAFOR
Security errors around us
TestFest
Non-Conventional Security Tests
ITCORNER
Make DragonflyBsd Great Again
Security BSides 2016
Critical Configuration Errors
Security PWNing Conference
IT Security devices and services - Full Protection or an invitation for cybercriminals?
Secure
DevOps/SysOps Security
Secure
Torturing the PHP interpreter
Confidence 2016
Data Leaks in Applications
Confidence | 4Developers
Is a systematic approach to security tests profitable?
MeetIT vol. 2
Information security – employee education – why we do it wrong
Semafor
OWASP Mobile Top Ten on the example of applications
Semafor
Mobile Application Security
KrakWhiteHat
Tools for automated testing of web application security
TestFest
Cybercriminals – How to defend against them?
WrocLOVE Geek Girls Carrots #28
BSD-licensed SASL library
EuroBSDcon 2015
Web application security tests – good practices
TestWarez
0xfb44f4f23139bb8a (facts and myths about pentester’s job)
Security BSIDEs 2015
Trust boundaries
Confidence
APT x 3 - three companies, three attack vectors, three to zero - selected case studies
Confidence
Analysis of the newest IT trends or: future problems and opportunities
Audyt bezpieczeństwa IT
Free tools that support the securing processes of a company infrastructure
SEMAFOR
OWASP Top 10 - The most popular security errors in web applications - practical examples
TestFest
DDoS attack - How to not lose your head on the front?
Security Case Study 2014
How much does DDoS costs – from the perspective of cybercriminal and attack victim
Security BSides
Security of Open Program Solutions of Unmanned Flying Platforms
Secure 2014
There is still one more error in every application...
Security BSides 2014
Cybercriminals and information theft - How to manage security incidents
Security Meetup
Protection against information leak - the most important aspects before, during, and after the security incident
MeetIT Vol. 8
Advanced Persistent Threat (APT) - Your defensive list
Attack and Defense
Trust boundaries
Security BSides 2013
Extraordinary cases from penetration tests or: the history of superiority of a superb team over automated tools
VirtualStudy
pwning ring0
Security BSides 2012
Simplest Ownage Human Observed… Routers
Confidence
Static analysis of the PHP language
OWASP
Advanced Persistent Threat - How organized cybercriminal groups operate
VirtualStudy
OWASP Fuzzing of PHP Interpreter
OWASP
Minerva - automated error searching
OWASP
Minor Flaws in Websites - A Real Case Study
ISSA
Cybercriminals of tomorrow - how much do they cost?
Seconference
A Pot of Honey in a Zombie
Pingwinaria
Security of community portals in terms of the Web 2.0 bugs
Pingwinaria
"Give Me Control of Souls, and I Will Rule the World" - A Botnet from a Network Administrator's Perspective
SecureCON