Coming in at number 8 is "From Akamai to F5 to NTLM... with love." by d3d!
Abusing Akamai with request smuggling, to abuse F5 with cache poisoning, to abuse traffic routes, to steal NTLM credentials.
This is what 3 months of research looks like!
Get the low down here: ctbb.show/61