42: The answer to life, the universe, and everything offensive security
Collect All the Data - Protect All the Things
Catching Cyber Criminals – Investigative techniques to identify modern threat actors and the clues they leave behind during data breaches
The $19.95 anonymous cyber profile
Prepare to Be Boarded! A Tale of Kubernetes, Plunder, and Cryptobooty
kubered - Recipes for C2 Operations on Kubernetes
Lying in Wait: Discovering and Exploiting Weaknesses in Automated Discovery Actions
COM Hijacking Techniques
Build your own multi-user password manager using open source software
No class, Low Tech, High damage
Testing Endpoint Protection: How Anyone Can Bypass Next Gen AV
Inter-chip communication - Testing end-to-end security on IoT
Assumed Breach: A Better Model for Penetration Testing
Early Detection Through Deception
The quest for 10g IDS
Adventures in Azure Privilege Escalation
REST in Peace: Abusing GraphQL to Attack Underlying Infrastructure
StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis
Swagger Defense
Kerberoasting Revisited
Breaking & Entering via SDR, or How I defeated Wiegend over UHF/VHF, or your apartment isn't safe...
The “Art” of The BEC - What Three Years of Fighting Has Taught Us
Practical Heuristic Exploitation
Hacking While Blind.
Choose Your Own TTX: Redefining the Incident Response Table Top Exercise
Assessing IoT Surveillance - Arlo
BloodHound: Head to Tail
Full Steam Ahead: Serverless Hacking 101
Hunting Phish Kits
One woman's journey to CISO leveraging Social Engineering
Next-gen IoT botnets - leveraging cloud implementations for shells on 500k IoTs
Red Team Methodology: A Naked Look
Five Mistakes We Wish Users Would Stop Making
SharPersist: Windows Persistence Toolkit in C#
Are you ready to leverage DevSecOps? Get ready and use it for good.
Attacking with Automation: How Office 365 automation provides another new risk to the cloud
API Keys, Now What?Taking the Pen Test Into the Amazon Cloud
Shadow IT in the Cloud
.NET Manifesto - Win Friends and Influence the Loader
Confessions of an IT / OT Marriage Counselor