The History of the Future of Cyber-Education
State of Win32k Security: Revisiting Insecure design
Offensive Browser Extension Development
Protect Your Payloads: Modern Keying Techniques
Jump Into IOT Hacking with the Damn Vulnerable Habit Helper Device
In-Memory Persistence: Terminate & Stay Resident Redux
Disaster Strikes: A Hacker's Cook book
Ninja Looting Like a Pirate
Hacking Mobile Applications with Frida
Victor or Victim? Strategies for Avoiding an InfoSec Cold War
Ubiquitous Shells
99 Reasons Your Perimeter Is Leaking - Evolution of C&C
Ship Hacking: a Primer for Today’s Pirate
Code Execution with JDK Scripting Tools & Nashorn Javascript Engine
PHONOPTICON - leveraging low-rent mobile ad services to achieve state-actor level mass surveillance on a shoestring budget
Bug Hunting in RouterOS
Breaking Into Your Building: A Hackers Guide to Unauthorized Access
The making of an iOS 11 jailbreak: Kiddie to kernel hacker in 14 sleepless nights.
Who Watches the Watcher? Detecting Hypervisor Introspection from Unprivileged Guests
Pwning in the Sandbox: OSX Macro Exploitation & Beyond
IOCs Today, Intelligence-Led Security Tomorrow