Tech Blog

The TL;DR on TF-IDF: Applied Machine Learning
GadgetProbe: Exploiting Deserialization to Brute-Force the Remote Classpath
How to Set Up Zniffer for Z-Wave
Dufflebag: Uncovering Secrets in Exposed EBS Volumes
Well, That Escalated Quickly
Escalator to the Cloud: 5 Privesc Attack Vectors in AWS
CVE-2019-18935: Remote Code Execution via Insecure Deserialization in Telerik UI
SFDC Secure Development Cheat Sheet
Reasonably Secure Electron
Breaching the Trusted Perimeter | Automating Exploitation