Offensive Security Posts

LEXSS: Bypassing Lexical Parsing Security Controls
Bad Pods: Kubernetes Pod Privilege Escalation
RMIScout: Safely and Quickly Brute-Force Java RMI Interfaces for Code Execution
Is CORS Becoming Obsolete?
Breaking Drone Defenses: Using Chicken Wire to Defeat Net Projectile-Based Products
Fishing the AWS IP Pool for Dangling Domains