Managing Security with the OWASP Assimilation Project.
Are You A PenTexter? Open-Sourcing Pentest Reporting and Automation.
Breaking the Payment Points of Interaction (POI)
Beyond the Tip of the IceBerg -- Fuzzing Binary Protocol for Deeper Code Coverage.
Operation Escalation: How Commodity Programs Are Evolving Into Advanced Threats
Ingress Egress: The emerging threats posed by augmented reality gaming.
Hunting high-value targets in corporate networks.
Powershell-Fu – Hunting on the Endpoint
Domains of Grays.
Six Degrees of Domain Admin - Using BloodHound to Automate Active Directory Domain Privilege Escalation Analysis
Is that a penguin in my Windows?
Building an EmPyre with Python.
One Compromise to Rule Them All