Further Adventures in Smart Home Automation: Honey, Please Don’t Burn Down Your Office
Securing Windows with Group Policy
Defending against PowerShell Attacks
CredDefense Toolkit
Steel Sharpens Steel: Using Red Teams to improve Blue Teams
Introducing DeepBlueCLI v2, now available in PowerShell and Python
Run your security program like a boss / practical governance advice
JReFrameworker: One Year Later
Hidden Treasure: Detecting Intrusions with ETW
How to Hunt for Lateral Movement on Your Network
Kali Linux?
Common Assessment Mistakes Pen Testers and Clients Should Avoid
Everything I Need To Know About Security I Learned From Watching Kung Fu Movies
Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science
Reverse Engineering Hardware via the HRES
IDAPython: The Wonder Woman of Embedded Device Reversing
Love is in the Air - DFIR and IDS for WiFi Networks
Going Deep and Empowering Users - PCAP Utilities and Combating Phishing in a new way
We're going on a Threat Hunt, Gonna find a bad-guy.