Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
SmogCloud: Expose Yourself Without Insecurity - Cloud Breach Patterns
Illumio Assessment Report: Interview with Raghu Nandakumara and Rob Ragan
Dufflebag Deep Dive: Uncovering Secrets in Exposed EBS Volumes
DerpCon 2020 - Demystifying Capture The Flags (CTF)s
Ham Hacks: Breaking into the World of Software Defined Radio
.NET Roulette: Exploiting Insecure Deserialization in Telerik UI
.Net Roulette Exploiting Insecure Deserialization in Telerik UI
Ham Hacks: Breaking into the world of software-defined radio
Demystifying Capture the Flags (CTFs)
Salesflare Focuses on Application Security for the G Suite Marketplace
Scaling up Google's Third-Party Security Program
Expose Yourself Without Insecurity: Cloud Breach Patterns
Attacking the Data Before the Decision
How to Write Like It's Your Job
Sonos Makes Secure Moves with Bishop Fox
Zigbee Hacking: Smarter Home Invasion with ZigDiggity
Finding Secrets In Publicly Exposed EBS Volumes
ZigDiggity: ZigBee Hacking Toolkit
Ghost In The Browser - Broad-Scale Espionage With Bitsquatting
Wickr: How Bishop Fox Enables Wickr's Security Assurance
Reverse Engineering Mobile Apps
Securing Boost.Beast
Twist & Shout: Ferris Bueller's Guide to Abuse Domain Permutations
Check Your Privilege (Escalation)
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.