Thin Slicing a Black Swan: A Search for the Unknowns
When Did the Smartphone Pentest Framework Get Awesome?
ShellSquid: Distributed Shells With Node
If You Can Open The Terminal, You Can Capture The Flag: CTF for Everyone
Becoming a Time Lord – Implications of Attacking Time Sources
Swinging Security Style: An Immodest Proposal
Drones: Augmenting your cyber attack tool bag with aerial weapon systems
Managed Service Providers: Pwn One and Done
No Tools? No Problem! Building a PowerShell Botnet
Extending the 20 Critical Security Controls to Gap Assessments and Security Maturity Modelling
Protecting Big Data From Cyber APT in the Cloud
Writing a Thumbdrive for Active Disk Antiforensics