- Case Management - Magnet Atlas
- Protecting code integrity with PGP
- Bug Bounty:Vulnerability On Facebook Support
- The 2017 SANS Holiday Hack Challenge
- Bug Bounty: Fastmail
- Making something out of Zeros: Alternative primitive for Windows Kernel Exploitation
- Network Pivoting Techniques
- Breaking Out HSTS (and HPKP) on Firefox, IE/Edge and (possibly) Chrome. Our Black Hat research
- ROBOT ATTACK – Security experts have discovered a 19-year-old flaw in the TLS network security protocol that affects many software worldwide.
- Invoke-EnumSecurityTools
- ELD Security Threats
- FCC Has Reportedly Been Using Dead People’s Social Media Accounts To Spread Propaganda
- Invoke-PSImage
- Custom x64 encoder with a basic polymorphic engine implementation
- Securing WordPress Against Infrastructure/Supply-Chain Attacks (Feedback Sought from /r/netsec)
- Remote LD_PRELOAD Exploitation
- There’s No Place Like ::1 — Enumerating Local IPv6 networks
- Knowing who is interviewing with Google
- Reading Backwards – Controlling an Integer Underflow in Adobe Reader
- aPAColypse now: Exploiting Windows 10 in a Local Network with WPAD/PAC and JScript
- Docker Hacklab