Eyeballer 2.0 Web Interface and Other New Features
Nov 15, 2021
By Dan Petro
A Snapshot of CAST in Action: Automating API Token Testing
Oct 21, 2021
By Zach Zeitlin
An Intro to Fuzzing (AKA Fuzz Testing)
Sep 28, 2021
By Matt Keeley
IAM Vulnerable - Assessing the AWS Assessment Tools
Sep 23, 2021
By Seth Art
IAM Vulnerable - An AWS IAM Privilege Escalation Playground
Sep 9, 2021
By Seth Art
You're Doing IoT RNG
Aug 5, 2021
By Dan Petro, Allan Cecil
LEXSS: Bypassing Lexical Parsing Security Controls
Jun 22, 2021
By Chris Davis
An Exploration of JSON Interoperability Vulnerabilities
Feb 25, 2021
By Jake Miller
Bad Pods: Kubernetes Pod Privilege Escalation
Jan 19, 2021
By Seth Art
Lessons Learned on Brute-forcing RMI-IIOP With RMIScout
Dec 8, 2020
By Jake Miller
Design Considerations for Secure GraphQL APIs
Sep 28, 2020
By Jake Miller
Design Considerations for Secure Cloud Deployment
Sep 15, 2020
By Jake Miller
h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)
Sep 8, 2020
By Jake Miller
Breaking HTTPS in the IoT: Practical Attacks For Reverse Engineers
Jun 30, 2020
By Nathan Elendt
How to Set Up Your Hardware Lab
Jun 23, 2020
By Jordan Parkin
RMIScout: Safely and Quickly Brute-Force Java RMI Interfaces for Code Execution
May 26, 2020
By Jake Miller
The TL;DR on TF-IDF: Applied Machine Learning
Apr 9, 2020
By Greg Mortensen, Joe Sechman
GadgetProbe: Exploiting Deserialization to Brute-Force the Remote Classpath
Feb 17, 2020
By Jake Miller
How to Set Up Zniffer for Z-Wave
Feb 12, 2020
By Priyank Nigam
Dufflebag: Uncovering Secrets in Exposed EBS Volumes
Feb 3, 2020
By Dan Petro
Escalator to the Cloud: 5 Privesc Attack Vectors in AWS
Dec 19, 2019
By Gerben Kleijn
Well, That Escalated Quickly: Privilege Escalation in AWS
Dec 19, 2019
By Gerben Kleijn
CVE-2019-18935: Remote Code Execution via Insecure Deserialization in Telerik UI
Dec 12, 2019
By Caleb Gross
SFDC Secure Development Cheat Sheet
Dec 11, 2019
By Zach Julian
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.