Ruby Vulnerabilities: Exploiting Dangerous Open, Send and Deserialization Operations
May 17, 2022
By Ben Lincoln
Our Top 9 Favorite Fuzzers
Apr 19, 2022
By Britt Kemp
Nuclei: Packing a Punch with Vulnerability Scanning
Apr 5, 2022
By Matt Thoreson, David Bravo, Zach Zeitlin, Sandeep Singh
Reports from the Field: Part 3
Mar 22, 2022
By Wes Hutcherson
Reports from the Field: Part 2
Mar 8, 2022
By Wes Hutcherson
Reports from the Field: Part 1
Mar 1, 2022
By Wes Hutcherson
Never, Ever, Ever Use Pixelation for Redacting Text
Feb 15, 2022
By Dan Petro
Creating an Exploit: SolarWinds Vulnerability CVE-2021-35211
Jan 13, 2022
By Carl Livitt
Zero-Day Collaboration: Working With Imperva to Eliminate a Critical Exposure
Jan 11, 2022
By Carl Livitt
How Bishop Fox Has Been Identifying and Exploiting Log4shell
Dec 27, 2021
By Dan Petro
XMPP: An Under-appreciated Attack Surface
Dec 6, 2021
By Zach Julian
Eyeballer 2.0 Web Interface and Other New Features
Nov 15, 2021
By Dan Petro
A Snapshot of CAST in Action: Automating API Token Testing
Oct 21, 2021
By Zach Zeitlin
An Intro to Fuzzing (AKA Fuzz Testing)
Sep 28, 2021
By Matt Keeley
IAM Vulnerable - Assessing the AWS Assessment Tools
Sep 23, 2021
By Seth Art
IAM Vulnerable - An AWS IAM Privilege Escalation Playground
Sep 9, 2021
By Seth Art
You're Doing IoT RNG
Aug 5, 2021
By Dan Petro, Allan Cecil
LEXSS: Bypassing Lexical Parsing Security Controls
Jun 22, 2021
By Chris Davis
An Exploration of JSON Interoperability Vulnerabilities
Feb 25, 2021
By Jake Miller
Bad Pods: Kubernetes Pod Privilege Escalation
Jan 19, 2021
By Seth Art
Lessons Learned on Brute-forcing RMI-IIOP With RMIScout
Dec 8, 2020
By Jake Miller
Design Considerations for Secure GraphQL APIs
Sep 28, 2020
By Jake Miller
Design Considerations for Secure Cloud Deployment
Sep 15, 2020
By Jake Miller
h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)
Sep 8, 2020
By Jake Miller
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.