Dec 19, 2019
Well, That Escalated Quickly: Privilege Escalation in AWS
By Gerben Kleijn
Dec 19, 2019
Escalator to the Cloud: 5 Privesc Attack Vectors in AWS
By Gerben Kleijn
Dec 12, 2019
CVE-2019-18935: Remote Code Execution via Insecure Deserialization in Telerik UI
By Caleb Gross
Dec 11, 2019
SFDC Secure Development Cheat Sheet
By Zach Julian
Nov 21, 2019
Reasonably Secure Electron
By Joe DeMesy
Oct 28, 2019
Glossary of Relevant AWS Terms
By Gerben Kleijn
Sep 12, 2019
Breaching the Trusted Perimeter | Automating Exploitation
By Jon Williams
Aug 08, 2019
Meet Eyeballer: An AI-powered, Open Source Tool for Assessing External Perimeters
By Dan Petro, Gavin Stroy
Aug 07, 2019
A How-To Guide for Using ZigDiggity, the Zigbee Hacking Toolkit
By Francis Brown, Matt Gleason
Aug 05, 2019
A How-To Guide for Using Sliver
By Joe DeMesy, Ronan Kervella
Jul 31, 2019
A Need for Vigilance in Open Source Software: Dolibarr CRM Advisory Release
By Priyank Nigam
Jul 18, 2019
Going Semi-Automated in an Automated World: Using Human-in-the-Loop Workflows to Improve Our Security Tools
By Jake Miller
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.