- Database Reverse Engineering, Part 1: Introduction
- Database Reverse Engineering, Part 2: Main Approaches
- Database Reverse Engineering, Part 3: Code Reuse, Conclusion
- Xerox Alto zero-day: cracking disk password protection on a 45 year old system
- Crackme0x01 Dissected with Radare2
- Automating the detection of Mimikatz with ELK
- PAST: Platform-Agnostic Security Tokens
- Stealing passwords via Meltdown vulnerability in real-time
- CVE-2017-17867: Remote Code Execution vulnerability in Inteno’s Iopsys
- Cisco IOS SNMP RCE PoC
- Why Raspberry Pi isn’t vulnerable to Spectre or Meltdown
- Epic Services & Stability Update
- Setting up a DNS Firewall on steroids
- Directory Listing to Account Takeover
- Backdoor Account Removed from Western Digital NAS Hard Drives
- Password protect the JSONRPC interface
- Bare Knuckled Antivirus Breaking
- “F**k you Thomas” - ToyTalk bug bounty writeup
- All Your Docs Are Belong To Us
- Computer and Network Security
- Constraint solver based on coverage-guided fuzzing
- The strange story of “Extended Random”
- Synology Photostation Multiple Vulnerabilities
- Malicious Document Targets Pyeongchang Olympics