APT Cyber Cloud of the Internet of Things
Stealthier Attacks and Smarter Defending with TLS Fingerprinting
Honeypots for Active Defense
Manufactorum Terminatus - The Attack and Defense of Industrial Manufacturers
High Stake Target: Lo-Tech Attack
Operating in the Shadows
Getting Started with PowerShell
OSINT for AppSec: Recon-ng and Beyond
Hacking Virtual Appliances
ISLET: An Attempt to Improve Linux-based Software Training
CyberSecurity Alphabets - Hacker Edition
Losing Battles - Winning Wars - Active Defense Rebooted
Social Media Risk Metrics. When OMGWTFBBQ Meets Risk Algorithms.
Building a Brain for Infosec
How to Build Your Own Covert SIGINT Vehicle
TBD
DNS Miner - A Semi-Automatic Incident Response and Threat Intelligence Tool for Small - Over Worked Security Teams
Invasion of the Hash Snatchers
My Password Cracking Brings All the Hashes to the Yard.
Intrusion Hunting for the Masses - A Practical Guide