Extracting an ELF From an ESP32
Battling Supermutants in the Phishing Wasteland
5G Protocol Vulnerabilities and Exploits
LABS: Networking / Core Services
LABS: Vulnerability Management
Adventures in Hardware Hacking or Building Expensive Tools on a Budget
Command and KubeCTL: Real-World Kubernetes Security for Pentesters
The Hacker’s Guide to Cybersecurity Policy in 2020
LABS: Network Security
LABS: Infrastructure / Visualization
Whitelisting LD_PRELOAD for Fun and No Profit
Airplane Mode: Cybersecurity @ 30,000+ Feet
The Cyberlous Mrs. Maisel: A Comedic (and slightly terrifying) Introduction to Information Warfare
Amateur Radio Exams
Privacy Scores for iOS Apps
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Review Process From the Ground Up
Choose Your Own Adventure: Ransomware Response!
Chip Decapping on a Budget
Teen Hacks for Obfuscating Identity on Social Media
Cisco SMB Products — Critical Vulnerablities / 0-day Release
Banjo: An Android Disassembler for Binary Ninja
Software Mitigations for Hardware Vulnerabilities
Resistance Isn’t Futile: A Practical Approach to Prioritizing Defenses with Threat Modeling
LABS: Log Collection / Aggregation
LABS: Security Operations Center
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Identify Spear-Phishing and Fraud
SBOM: Screw it, We’ll Do it Live!
Face/Off: Action Plan for Perils & Privileges of Facial Recognition
Security Researcher OPSEC
Using OSINT for Human Rights and Victim Support
LABS: Threat Hunting / Log Correlation
LABS: Wireless Network
0wn the Con
Anti-Forensics for Fun and Privacy
Hacking Democracy: On Securing an Election