- Subverting your server through its BMC : the HPE iLO4 case
- Taking over Facebook accounts using Free Basics partner portal
- Executable and Linkable Format 101. Part 2: Symbols
- Crackerjack - Introduction and Puzzle A Solution
- Dissecting mobile native code packers. A case study
- DSA-4105-1 mpv
- Reddit : Volatility Workbench (GUI)
- Reddit : COFEE / WOLF - Tools opinion
- Reddit : Where you store malware samples?
- Local File Disclosure in Marked2
- usn-search is a tool to import USN (Ubuntu Security Notices) database dump into a MongoDB
- It’s Hard To Change The Keys To The Internet And It Involves Destroying HSM’s
- Internals of AFL fuzzer - QEMU Instrumentation
- Joomla! 3.8.3: Privilege Escalation via SQL Injection
- A witch-hunt for trojans in our chips
- Robin Hood vs Ciso ASA AnyConnect
- A flexible DNS proxy, with support for encrypted DNS protocols.
- Scripts And Tools For Pentesting
- Bug bounty left over (and rant) Part III (Google and Twitter)
- Flash 0-Day In The Wild: Group 123 At The Controls
- Grammarly: auth tokens are accessible to all websites
- BlueHat IL abstracts
- One man’s patch is another man’s treasure: A tale of a failed HPE patch
- Reddit : Using FTK Imager to find file sizes
- Reddit : Does anyone here have access to Brett Shavers’ Case Studies series?
- Reddit : Forensic analysis of Microsoft Surface Pro 4
- Reddit : Timeline of a APFS volume