Workshop Series: Inside Cirro
Building Tools: What, When, and How
Sliver Workshop Part 3: Building Better Encoders
Demystifying 5G Security: Understanding the Registration Protocol
Sliver Workshop Part 2: Staging & Automation
Sliver Workshop Part 1: Getting Started & 1.6 Features
Patch Perfect: Harmonizing with LLMs to Find Security Vulns
Smart Grills Get Smarter: Improving IoT Security One Device at a Time
Come WiFind Me: WiFi & Other RF Surveillance
Sliver Mastery: Dominating Active Directory Through Advanced Trust Exploitation
CloudFoxable: A Practical Demo of AWS Cloud Security Misconfiguration Attacks
Swagger Jacker: Improved Auditing of OpenAPI Definition Files
Ace the OSEP Exam with Sliver Framework
JavaScript Vulnerability Mining: Mastering jsluice for Advanced Web App Testing
Powering Up Burp Suite: Building Custom Extensions for Advanced Web Application Testing
How Attackers Slip Past EDR: A Live Look at LoLBins in Action
CVE Spotlight: Breaking Down Zimbra’s RCE Vulnerabilities
Spoofy in Action: Advancing Domain Spoofing Detection
Process Injection on Linux: A Deep Dive into asminject.py
CloudFox in Action: Mapping Exploitable Paths in AWS
The Mind Behind Nuclei, Demo with Sandeep Singh
Fuzzing: Get the buzz on fuzz testing in software development
Unredacter Challenge: John L.'s Solution
Unredacter Challenge: Shawn A.'s Solution
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.