Next Level Smuggling with WebAssembly 14 Mar 2025 Using WebAssembly to deliver malicious payloads through HTML smuggling. Read more
The $1.5bn Bybit theft – what happened? 24 Feb 2025 An analysis of one of the most significant breaches in crypto history - the theft of $1.5 billion... Read more
Introducing Raccoon 6 Feb 2025 Introducing Raccoon - a C# tool for extending the screenshot functionality of Command and Control (C2) frameworks, even... Read more
Time Travel Debugging Shellcode with Binary Ninja 15 Jan 2025 Learn how to debug shellcode using Time Travel Debugging (TTD) in Binary Ninja. This guide walks you through... Read more
Binary Ninja Plugin 18 Sep 2024 Recently, in response to a customer incident we needed to reverse engineer a malware sample of WhiteRabbit ransomware... Read more
This Badge is My Badge 28 Aug 2024 When it comes to covert entry assessments, successfully capturing RFID badge values can mean the difference between failure... Read more
Version Tracking in Ghidra 9 Aug 2024 When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s... Read more
Vulnerabilities in AI Agents 25 Jul 2024 LLMs are becoming increasingly accessible to everyone. It is very easy to create your own LLM system, however... Read more
Emulation with Qiling 9 May 2024 Qiling is an emulation framework that builds upon the Unicorn emulator by providing higher level functionality such as... Read more
CVE-2024-20356: Jailbreaking a Cisco appliance to run DOOM 18 Apr 2024 A walkthrough of CVE-2024-20356, a high severity Command Injection vulnerability affecting a range of Cisco products. This vulnerability... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*