Using CloudTrail to Pivot to AWS Accounts
Jun 7, 2022
By Gerben Kleijn
ripgen: Taking the Guesswork Out of Subdomain Discovery
Jun 1, 2022
By Justin Rhinehart, Joe Sechman
Call of DeFi: The Battleground of Blockchain
May 24, 2022
By Dylan Dubief
Ruby Vulnerabilities: Exploiting Dangerous Open, Send and Deserialization Operations
May 17, 2022
By Ben Lincoln
Our Top 9 Favorite Fuzzers
Apr 19, 2022
By Britt Kemp
Nuclei: Packing a Punch with Vulnerability Scanning
Apr 5, 2022
By Matt Thoreson, David Bravo, Zach Zeitlin, Sandeep Singh
Reports from the Field: Part 3
Mar 22, 2022
By Wes Hutcherson
Reports from the Field: Part 2
Mar 8, 2022
By Wes Hutcherson
Reports from the Field: Part 1
Mar 1, 2022
By Wes Hutcherson
Never, Ever, Ever Use Pixelation for Redacting Text
Feb 15, 2022
By Dan Petro
Creating an Exploit: SolarWinds Vulnerability CVE-2021-35211
Jan 13, 2022
By Carl Livitt
Zero-Day Collaboration: Working With Imperva to Eliminate a Critical Exposure
Jan 11, 2022
By Carl Livitt
How Bishop Fox Has Been Identifying and Exploiting Log4shell
Dec 27, 2021
By Dan Petro
XMPP: An Under-appreciated Attack Surface
Dec 6, 2021
By Zach Julian
Eyeballer 2.0 Web Interface and Other New Features
Nov 15, 2021
By Dan Petro
A Snapshot of CAST in Action: Automating API Token Testing
Oct 21, 2021
By Zach Zeitlin
An Intro to Fuzzing (AKA Fuzz Testing)
Sep 28, 2021
By Matt Keeley
IAM Vulnerable - Assessing the AWS Assessment Tools
Sep 23, 2021
By Seth Art
IAM Vulnerable - An AWS IAM Privilege Escalation Playground
Sep 9, 2021
By Seth Art
You're Doing IoT RNG
Aug 5, 2021
By Dan Petro, Allan Cecil
LEXSS: Bypassing Lexical Parsing Security Controls
Jun 22, 2021
By Chris Davis
An Exploration of JSON Interoperability Vulnerabilities
Feb 25, 2021
By Jake Miller
Bad Pods: Kubernetes Pod Privilege Escalation
Jan 19, 2021
By Seth Art
Lessons Learned on Brute-forcing RMI-IIOP With RMIScout
Dec 8, 2020
By Jake Miller
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.