- Open Source Mobile Device Forensics
- Mobile IT-Forensics: SnapChat demystified
- 2015 DFRWS Forensics Challenge : SUBMITTED SOLUTIONS AND SOURCE CODE RELEASED
- Malicious traffic detection system
- Automated Information Gathering Tool for Penetration Testers
- Windows Memory Forensics with Volatility
- Spectre & Meltdown vulnerability/mitigation checker for Linux
- Lack of authentication leaks customer details in SinVR - an adult VR application
- Rumble In The Jungo – A Code Execution Walkthrough – CVE-2018-5189
- A script modified from speed47 to provide KV-pair results into a Splunk UF scripted input
- Vulnerability Spotlight: Multiple Vulnerabilities in the CPP and Parity Ethereum Client
- Attack of the Week: Group Messaging in WhatsApp and Signal
- VMware Horizon (V4H/V4PA) desktop agent privilege escalation vulnerability (CVE-2017-4946)
- POCs cve-2017-18016
- TCP Bind Shell in Assembly (ARM 32-bit)
- Perfect SAP Penetration testing. Part 3: The Scope of Vulnerability Search
- macOS High Sierra’s App Store System Preferences Can Be Unlocked With Any Password
- Reverse Engineering the OBi200 Google Voice Appliance: Part 3
- SANS Christmas Challenge 2017