Unredacter Challenge: Alejandro's Solution
Managing Application Security Risk with Threat Modeling
13th B-Sides Las Vegas - ICS Security Assessments 101 or How da Fox I Test Dis?
13th BSides Las Vegas - Management Hacking 101
SmogCloud: Expose Yourself Without Insecurity - Cloud Breach Patterns
SmogCloud: Expose Yourself Without Insecurity - Cloud Breach Patterns
Dufflebag Deep Dive: Uncovering Secrets in Exposed EBS Volumes
DerpCon 2020 - Demystifying Capture The Flags (CTF)s
Ham Hacks: Breaking into the World of Software Defined Radio
.NET Roulette: Exploiting Insecure Deserialization in Telerik UI
.Net Roulette Exploiting Insecure Deserialization in Telerik UI
Ham Hacks: Breaking into the world of software-defined radio
Demystifying Capture the Flags (CTFs)
Expose Yourself Without Insecurity: Cloud Breach Patterns
Attacking the Data Before the Decision
How to Write Like It's Your Job
Zigbee Hacking: Smarter Home Invasion with ZigDiggity
Finding Secrets In Publicly Exposed EBS Volumes
ZigDiggity: ZigBee Hacking Toolkit
Ghost In The Browser - Broad-Scale Espionage With Bitsquatting
Reverse Engineering Mobile Apps
Twist & Shout: Ferris Bueller's Guide to Abuse Domain Permutations
Check Your Privilege (Escalation)
Network Penetration Testing Toolkit: Netcat, Nmap, and Metasploit Basics
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.