The Background Noise of the Internet
IoT RCE, a Study With Disney
Opening Closed Systems with GlitchKit
Profiling and Detecting all Things SSL with JA3
Pages from a Sword-Maker’s Notebook pt. II
When CAN CANT
Nation-State Espionage: Hunting Multi-Platform APTs on a Global Scale
Building Absurd Christmas Light Shows
Building a GoodWatch
Catch Me If You Can: A Decade of Evasive Malware Attack and Defense
Electronic Voting in 2018: Threat or Menace
ODA: A Collaborative, Open Source Reversing Platform in the Cloud
Someone is Lying to You on the Internet: Using Analytics to Find Bot Submissions in the FCC Net Neutrality Submissions
A Social Science Approach to Cybersecurity Education for all Disciplines
Better Git Hacking: Extracting “Deleted” Secrets from Git Databases with Grawler
Bludgeoning Bootloader Bugs: No Write Left Behind
Listing the 1337: Adventures in Curating HackerTwitter’s Institutional Knowledge
CertGraph: A Tool to Crawl the Graph of SSL Certificate Alternate Names using Certificate Transparency
AWS Honey Tokens with SPACECRAB
Cyberlaw: Year in Review
afl-unicorn: Fuzzing the ‘Unfuzzable’
Time Signature Based Matching for Data Fusion and Coordination Detection in Cyber Relevant Logs
Skill Building By Revisiting Past CVEs
radare2 in Conversation
Defending Against Robot Attacks
Hacking the News: an Infosec Guide to the Media, and How to Talk to Them
OK Google, Tell Me About Myself
Saturday Night Party