2020

  1. A machine learning journey
  2. Beware of the Shadowbunny! at BSides Singapore
  3. Race conditions when applying ACLs
  4. Red Teaming Telemetry Systems
  5. Illusion of Control: Capability Maturity Models and Red Teaming
  6. Motivated Intruder - Red Teaming for Privacy!
  7. Firefox - Debugger Client for Cookie Access
  8. Remotely debugging Firefox instances
  9. Performing port-proxying and port-forwarding on Windows
  10. Blast from the past: Cross Site Scripting on the AWS Console
  11. Feedspot ranked 'Embrace the Red' one of the top 15 pentest blogs
  12. Using built-in OS indexing features for credential hunting
  13. Shadowbunny article published in the PenTest Magazine
  14. Putting system owners in Security Bug Jail
  15. Red Teaming and Monte Carlo Simulations
  16. Phishing metrics - what to track?
  17. $3000 Bug Bounty Award from Mozilla for a successful targeted Credential Hunt
  18. Cookie Crimes and the new Microsoft Edge Browser
  19. Post-Exploitation: Abusing Chrome's debugging feature to observe and control browsing sessions remotely
  20. Hunting for credentials and building a credential type reference catalog
  21. Attack Graphs - How to create and present them
  22. Cybersecurity Attacks - Red Team Strategies has been released.
  23. 2600 - The Hacker Quarterly - Pass the Cookie Article
  24. Web Application Security Principles Revisited
  25. Zero Trust and Disabling Remote Management Endpoints

2019

  1. Book: Cybersecurity Attacks - Red Team Strategies
  2. MITRE ATT&CK Update for Cloud and cookies!
  3. Coinbase under attack and cookie theft
  4. Cybersecurity - Homefield Advantage
  5. Now using Hugo for the blog
  6. BashSpray - Simple Password Spray Bash Script
  7. Active Directory and MacOS
  8. Google Leaks Your Alternate Email Addresses to Unauthenticated Users
  9. Lyrebird - Hack the hacker (and take a picture)
  10. KoiPhish - The Beautiful Phishing Proxy
  11. McPivot and useful LLDB commands

2018

  1. Pass the Cookie and Pivot to the Clouds

2020

  1. A machine learning journey
  2. Beware of the Shadowbunny! at BSides Singapore
  3. Race conditions when applying ACLs
  4. Red Teaming Telemetry Systems
  5. Illusion of Control: Capability Maturity Models and Red Teaming
  6. Motivated Intruder - Red Teaming for Privacy!
  7. Firefox - Debugger Client for Cookie Access
  8. Remotely debugging Firefox instances
  9. Performing port-proxying and port-forwarding on Windows
  10. Blast from the past: Cross Site Scripting on the AWS Console
  11. Feedspot ranked 'Embrace the Red' one of the top 15 pentest blogs
  12. Using built-in OS indexing features for credential hunting
  13. Shadowbunny article published in the PenTest Magazine
  14. Putting system owners in Security Bug Jail
  15. Red Teaming and Monte Carlo Simulations
  16. Phishing metrics - what to track?
  17. $3000 Bug Bounty Award from Mozilla for a successful targeted Credential Hunt
  18. Cookie Crimes and the new Microsoft Edge Browser
  19. Post-Exploitation: Abusing Chrome's debugging feature to observe and control browsing sessions remotely
  20. Hunting for credentials and building a credential type reference catalog
  21. Attack Graphs - How to create and present them
  22. Cybersecurity Attacks - Red Team Strategies has been released.
  23. 2600 - The Hacker Quarterly - Pass the Cookie Article
  24. Web Application Security Principles Revisited
  25. Zero Trust and Disabling Remote Management Endpoints

2019

  1. Book: Cybersecurity Attacks - Red Team Strategies
  2. MITRE ATT&CK Update for Cloud and cookies!
  3. Coinbase under attack and cookie theft
  4. Cybersecurity - Homefield Advantage
  5. Now using Hugo for the blog
  6. BashSpray - Simple Password Spray Bash Script
  7. Active Directory and MacOS
  8. Google Leaks Your Alternate Email Addresses to Unauthenticated Users
  9. Lyrebird - Hack the hacker (and take a picture)
  10. KoiPhish - The Beautiful Phishing Proxy
  11. McPivot and useful LLDB commands

2018

  1. Pass the Cookie and Pivot to the Clouds

2020

  1. A machine learning journey
  2. Beware of the Shadowbunny! at BSides Singapore
  3. Race conditions when applying ACLs
  4. Red Teaming Telemetry Systems
  5. Illusion of Control: Capability Maturity Models and Red Teaming
  6. Motivated Intruder - Red Teaming for Privacy!
  7. Firefox - Debugger Client for Cookie Access
  8. Remotely debugging Firefox instances
  9. Performing port-proxying and port-forwarding on Windows
  10. Blast from the past: Cross Site Scripting on the AWS Console
  11. Feedspot ranked 'Embrace the Red' one of the top 15 pentest blogs
  12. Using built-in OS indexing features for credential hunting
  13. Shadowbunny article published in the PenTest Magazine
  14. Putting system owners in Security Bug Jail
  15. Red Teaming and Monte Carlo Simulations
  16. Phishing metrics - what to track?
  17. $3000 Bug Bounty Award from Mozilla for a successful targeted Credential Hunt
  18. Cookie Crimes and the new Microsoft Edge Browser
  19. Post-Exploitation: Abusing Chrome's debugging feature to observe and control browsing sessions remotely
  20. Hunting for credentials and building a credential type reference catalog
  21. Attack Graphs - How to create and present them
  22. Cybersecurity Attacks - Red Team Strategies has been released.
  23. 2600 - The Hacker Quarterly - Pass the Cookie Article
  24. Web Application Security Principles Revisited
  25. Zero Trust and Disabling Remote Management Endpoints

2019

  1. Book: Cybersecurity Attacks - Red Team Strategies
  2. MITRE ATT&CK Update for Cloud and cookies!
  3. Coinbase under attack and cookie theft
  4. Cybersecurity - Homefield Advantage
  5. Now using Hugo for the blog
  6. BashSpray - Simple Password Spray Bash Script
  7. Active Directory and MacOS
  8. Google Leaks Your Alternate Email Addresses to Unauthenticated Users
  9. Lyrebird - Hack the hacker (and take a picture)
  10. KoiPhish - The Beautiful Phishing Proxy
  11. McPivot and useful LLDB commands

2018

  1. Pass the Cookie and Pivot to the Clouds

2020

  1. A machine learning journey
  2. Beware of the Shadowbunny! at BSides Singapore
  3. Race conditions when applying ACLs
  4. Red Teaming Telemetry Systems
  5. Illusion of Control: Capability Maturity Models and Red Teaming
  6. Motivated Intruder - Red Teaming for Privacy!
  7. Firefox - Debugger Client for Cookie Access
  8. Remotely debugging Firefox instances
  9. Performing port-proxying and port-forwarding on Windows
  10. Blast from the past: Cross Site Scripting on the AWS Console
  11. Feedspot ranked 'Embrace the Red' one of the top 15 pentest blogs
  12. Using built-in OS indexing features for credential hunting
  13. Shadowbunny article published in the PenTest Magazine
  14. Putting system owners in Security Bug Jail
  15. Red Teaming and Monte Carlo Simulations
  16. Phishing metrics - what to track?
  17. $3000 Bug Bounty Award from Mozilla for a successful targeted Credential Hunt
  18. Cookie Crimes and the new Microsoft Edge Browser
  19. Post-Exploitation: Abusing Chrome's debugging feature to observe and control browsing sessions remotely
  20. Hunting for credentials and building a credential type reference catalog
  21. Attack Graphs - How to create and present them
  22. Cybersecurity Attacks - Red Team Strategies has been released.
  23. 2600 - The Hacker Quarterly - Pass the Cookie Article
  24. Web Application Security Principles Revisited
  25. Zero Trust and Disabling Remote Management Endpoints

2019

  1. Book: Cybersecurity Attacks - Red Team Strategies
  2. MITRE ATT&CK Update for Cloud and cookies!
  3. Coinbase under attack and cookie theft
  4. Cybersecurity - Homefield Advantage
  5. Now using Hugo for the blog
  6. BashSpray - Simple Password Spray Bash Script
  7. Active Directory and MacOS
  8. Google Leaks Your Alternate Email Addresses to Unauthenticated Users
  9. Lyrebird - Hack the hacker (and take a picture)
  10. KoiPhish - The Beautiful Phishing Proxy
  11. McPivot and useful LLDB commands

2018

  1. Pass the Cookie and Pivot to the Clouds

2020

  1. A machine learning journey
  2. Beware of the Shadowbunny! at BSides Singapore
  3. Race conditions when applying ACLs
  4. Red Teaming Telemetry Systems
  5. Illusion of Control: Capability Maturity Models and Red Teaming
  6. Motivated Intruder - Red Teaming for Privacy!
  7. Firefox - Debugger Client for Cookie Access
  8. Remotely debugging Firefox instances
  9. Performing port-proxying and port-forwarding on Windows
  10. Blast from the past: Cross Site Scripting on the AWS Console
  11. Feedspot ranked 'Embrace the Red' one of the top 15 pentest blogs
  12. Using built-in OS indexing features for credential hunting
  13. Shadowbunny article published in the PenTest Magazine
  14. Putting system owners in Security Bug Jail
  15. Red Teaming and Monte Carlo Simulations
  16. Phishing metrics - what to track?
  17. $3000 Bug Bounty Award from Mozilla for a successful targeted Credential Hunt
  18. Cookie Crimes and the new Microsoft Edge Browser
  19. Post-Exploitation: Abusing Chrome's debugging feature to observe and control browsing sessions remotely
  20. Hunting for credentials and building a credential type reference catalog
  21. Attack Graphs - How to create and present them
  22. Cybersecurity Attacks - Red Team Strategies has been released.
  23. 2600 - The Hacker Quarterly - Pass the Cookie Article
  24. Web Application Security Principles Revisited
  25. Zero Trust and Disabling Remote Management Endpoints

2019

  1. Book: Cybersecurity Attacks - Red Team Strategies
  2. MITRE ATT&CK Update for Cloud and cookies!
  3. Coinbase under attack and cookie theft
  4. Cybersecurity - Homefield Advantage
  5. Now using Hugo for the blog
  6. BashSpray - Simple Password Spray Bash Script
  7. Active Directory and MacOS
  8. Google Leaks Your Alternate Email Addresses to Unauthenticated Users
  9. Lyrebird - Hack the hacker (and take a picture)
  10. KoiPhish - The Beautiful Phishing Proxy
  11. McPivot and useful LLDB commands

2018

  1. Pass the Cookie and Pivot to the Clouds

2020

  1. A machine learning journey
  2. Beware of the Shadowbunny! at BSides Singapore
  3. Race conditions when applying ACLs
  4. Red Teaming Telemetry Systems
  5. Illusion of Control: Capability Maturity Models and Red Teaming
  6. Motivated Intruder - Red Teaming for Privacy!
  7. Firefox - Debugger Client for Cookie Access
  8. Remotely debugging Firefox instances
  9. Performing port-proxying and port-forwarding on Windows
  10. Blast from the past: Cross Site Scripting on the AWS Console
  11. Feedspot ranked 'Embrace the Red' one of the top 15 pentest blogs
  12. Using built-in OS indexing features for credential hunting
  13. Shadowbunny article published in the PenTest Magazine
  14. Putting system owners in Security Bug Jail
  15. Red Teaming and Monte Carlo Simulations
  16. Phishing metrics - what to track?
  17. $3000 Bug Bounty Award from Mozilla for a successful targeted Credential Hunt
  18. Cookie Crimes and the new Microsoft Edge Browser
  19. Post-Exploitation: Abusing Chrome's debugging feature to observe and control browsing sessions remotely
  20. Hunting for credentials and building a credential type reference catalog
  21. Attack Graphs - How to create and present them
  22. Cybersecurity Attacks - Red Team Strategies has been released.
  23. 2600 - The Hacker Quarterly - Pass the Cookie Article
  24. Web Application Security Principles Revisited
  25. Zero Trust and Disabling Remote Management Endpoints

2019

  1. Book: Cybersecurity Attacks - Red Team Strategies
  2. MITRE ATT&CK Update for Cloud and cookies!
  3. Coinbase under attack and cookie theft
  4. Cybersecurity - Homefield Advantage
  5. Now using Hugo for the blog
  6. BashSpray - Simple Password Spray Bash Script
  7. Active Directory and MacOS
  8. Google Leaks Your Alternate Email Addresses to Unauthenticated Users
  9. Lyrebird - Hack the hacker (and take a picture)
  10. KoiPhish - The Beautiful Phishing Proxy
  11. McPivot and useful LLDB commands

2018

  1. Pass the Cookie and Pivot to the Clouds

2020

  1. A machine learning journey
  2. Beware of the Shadowbunny! at BSides Singapore
  3. Race conditions when applying ACLs
  4. Red Teaming Telemetry Systems
  5. Illusion of Control: Capability Maturity Models and Red Teaming
  6. Motivated Intruder - Red Teaming for Privacy!
  7. Firefox - Debugger Client for Cookie Access
  8. Remotely debugging Firefox instances
  9. Performing port-proxying and port-forwarding on Windows
  10. Blast from the past: Cross Site Scripting on the AWS Console
  11. Feedspot ranked 'Embrace the Red' one of the top 15 pentest blogs
  12. Using built-in OS indexing features for credential hunting
  13. Shadowbunny article published in the PenTest Magazine
  14. Putting system owners in Security Bug Jail
  15. Red Teaming and Monte Carlo Simulations
  16. Phishing metrics - what to track?
  17. $3000 Bug Bounty Award from Mozilla for a successful targeted Credential Hunt
  18. Cookie Crimes and the new Microsoft Edge Browser
  19. Post-Exploitation: Abusing Chrome's debugging feature to observe and control browsing sessions remotely
  20. Hunting for credentials and building a credential type reference catalog
  21. Attack Graphs - How to create and present them
  22. Cybersecurity Attacks - Red Team Strategies has been released.
  23. 2600 - The Hacker Quarterly - Pass the Cookie Article
  24. Web Application Security Principles Revisited
  25. Zero Trust and Disabling Remote Management Endpoints

2019

  1. Book: Cybersecurity Attacks - Red Team Strategies
  2. MITRE ATT&CK Update for Cloud and cookies!
  3. Coinbase under attack and cookie theft
  4. Cybersecurity - Homefield Advantage
  5. Now using Hugo for the blog
  6. BashSpray - Simple Password Spray Bash Script
  7. Active Directory and MacOS
  8. Google Leaks Your Alternate Email Addresses to Unauthenticated Users
  9. Lyrebird - Hack the hacker (and take a picture)
  10. KoiPhish - The Beautiful Phishing Proxy
  11. McPivot and useful LLDB commands

2018

  1. Pass the Cookie and Pivot to the Clouds

2020

  1. A machine learning journey
  2. Beware of the Shadowbunny! at BSides Singapore
  3. Race conditions when applying ACLs
  4. Red Teaming Telemetry Systems
  5. Illusion of Control: Capability Maturity Models and Red Teaming
  6. Motivated Intruder - Red Teaming for Privacy!
  7. Firefox - Debugger Client for Cookie Access
  8. Remotely debugging Firefox instances
  9. Performing port-proxying and port-forwarding on Windows
  10. Blast from the past: Cross Site Scripting on the AWS Console
  11. Feedspot ranked 'Embrace the Red' one of the top 15 pentest blogs
  12. Using built-in OS indexing features for credential hunting
  13. Shadowbunny article published in the PenTest Magazine
  14. Putting system owners in Security Bug Jail
  15. Red Teaming and Monte Carlo Simulations
  16. Phishing metrics - what to track?
  17. $3000 Bug Bounty Award from Mozilla for a successful targeted Credential Hunt
  18. Cookie Crimes and the new Microsoft Edge Browser
  19. Post-Exploitation: Abusing Chrome's debugging feature to observe and control browsing sessions remotely
  20. Hunting for credentials and building a credential type reference catalog
  21. Attack Graphs - How to create and present them
  22. Cybersecurity Attacks - Red Team Strategies has been released.
  23. 2600 - The Hacker Quarterly - Pass the Cookie Article
  24. Web Application Security Principles Revisited
  25. Zero Trust and Disabling Remote Management Endpoints

2019

  1. Book: Cybersecurity Attacks - Red Team Strategies
  2. MITRE ATT&CK Update for Cloud and cookies!
  3. Coinbase under attack and cookie theft
  4. Cybersecurity - Homefield Advantage
  5. Now using Hugo for the blog
  6. BashSpray - Simple Password Spray Bash Script
  7. Active Directory and MacOS
  8. Google Leaks Your Alternate Email Addresses to Unauthenticated Users
  9. Lyrebird - Hack the hacker (and take a picture)
  10. KoiPhish - The Beautiful Phishing Proxy
  11. McPivot and useful LLDB commands

2018

  1. Pass the Cookie and Pivot to the Clouds

2020

  1. A machine learning journey
  2. Beware of the Shadowbunny! at BSides Singapore
  3. Race conditions when applying ACLs
  4. Red Teaming Telemetry Systems
  5. Illusion of Control: Capability Maturity Models and Red Teaming
  6. Motivated Intruder - Red Teaming for Privacy!
  7. Firefox - Debugger Client for Cookie Access
  8. Remotely debugging Firefox instances
  9. Performing port-proxying and port-forwarding on Windows
  10. Blast from the past: Cross Site Scripting on the AWS Console
  11. Feedspot ranked 'Embrace the Red' one of the top 15 pentest blogs
  12. Using built-in OS indexing features for credential hunting
  13. Shadowbunny article published in the PenTest Magazine
  14. Putting system owners in Security Bug Jail
  15. Red Teaming and Monte Carlo Simulations
  16. Phishing metrics - what to track?
  17. $3000 Bug Bounty Award from Mozilla for a successful targeted Credential Hunt
  18. Cookie Crimes and the new Microsoft Edge Browser
  19. Post-Exploitation: Abusing Chrome's debugging feature to observe and control browsing sessions remotely
  20. Hunting for credentials and building a credential type reference catalog
  21. Attack Graphs - How to create and present them
  22. Cybersecurity Attacks - Red Team Strategies has been released.
  23. 2600 - The Hacker Quarterly - Pass the Cookie Article
  24. Web Application Security Principles Revisited
  25. Zero Trust and Disabling Remote Management Endpoints

2019

  1. Book: Cybersecurity Attacks - Red Team Strategies
  2. MITRE ATT&CK Update for Cloud and cookies!
  3. Coinbase under attack and cookie theft
  4. Cybersecurity - Homefield Advantage
  5. Now using Hugo for the blog
  6. BashSpray - Simple Password Spray Bash Script
  7. Active Directory and MacOS
  8. Google Leaks Your Alternate Email Addresses to Unauthenticated Users
  9. Lyrebird - Hack the hacker (and take a picture)
  10. KoiPhish - The Beautiful Phishing Proxy
  11. McPivot and useful LLDB commands

2018

  1. Pass the Cookie and Pivot to the Clouds

2020

  1. A machine learning journey
  2. Beware of the Shadowbunny! at BSides Singapore
  3. Race conditions when applying ACLs
  4. Red Teaming Telemetry Systems
  5. Illusion of Control: Capability Maturity Models and Red Teaming
  6. Motivated Intruder - Red Teaming for Privacy!
  7. Firefox - Debugger Client for Cookie Access
  8. Remotely debugging Firefox instances
  9. Performing port-proxying and port-forwarding on Windows
  10. Blast from the past: Cross Site Scripting on the AWS Console
  11. Feedspot ranked 'Embrace the Red' one of the top 15 pentest blogs
  12. Using built-in OS indexing features for credential hunting
  13. Shadowbunny article published in the PenTest Magazine
  14. Putting system owners in Security Bug Jail
  15. Red Teaming and Monte Carlo Simulations
  16. Phishing metrics - what to track?
  17. $3000 Bug Bounty Award from Mozilla for a successful targeted Credential Hunt
  18. Cookie Crimes and the new Microsoft Edge Browser
  19. Post-Exploitation: Abusing Chrome's debugging feature to observe and control browsing sessions remotely
  20. Hunting for credentials and building a credential type reference catalog
  21. Attack Graphs - How to create and present them
  22. Cybersecurity Attacks - Red Team Strategies has been released.
  23. 2600 - The Hacker Quarterly - Pass the Cookie Article
  24. Web Application Security Principles Revisited
  25. Zero Trust and Disabling Remote Management Endpoints

2019

  1. Book: Cybersecurity Attacks - Red Team Strategies
  2. MITRE ATT&CK Update for Cloud and cookies!
  3. Coinbase under attack and cookie theft
  4. Cybersecurity - Homefield Advantage
  5. Now using Hugo for the blog
  6. BashSpray - Simple Password Spray Bash Script
  7. Active Directory and MacOS
  8. Google Leaks Your Alternate Email Addresses to Unauthenticated Users
  9. Lyrebird - Hack the hacker (and take a picture)
  10. KoiPhish - The Beautiful Phishing Proxy
  11. McPivot and useful LLDB commands

2018

  1. Pass the Cookie and Pivot to the Clouds