Skip content

1 10 187 results

Filter by

  • Binary Ninja Plugin

    Recently, in response to a customer incident we needed to reverse engineer a malware sample of WhiteRabbit ransomware...

    Read more
  • This Badge is My Badge

    When it comes to covert entry assessments, successfully capturing RFID badge values can mean the difference between failure...

    Read more
  • Version Tracking in Ghidra

    When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s...

    Read more
  • Cross Site Scripting Payloads

    We curate a set of fun and interesting Cross Site Scripting (XSS) payloads. They’re designed for quick...

    Read more
  • Prowl

    Prowl is an open source data harvesting tool written in Python to help alleviate some of the more...

    Read more
  • PoshC2 documentation

    We maintain PoshC2 documentation over at https://poshc2.readthedocs.io/en/latest/. For your convenience, we have also embedded it below.

    Read more
  • Penetration Testing

    We are looking for passionate and skilled penetration testers with professional experience. There are multiple roles available...

    Read more
  • Accelerator Program

    Do you want a job in cyber security but don’t know how to break into the industry? Tired...

    Read more
  • Rocktastic

    Bigger, better (faster, stronger…) Bigger isn’t always better, but sometimes it is. If you need a huge word...

    Read more
  • Advanced Threat Actor Simulation - Red Team Training

    This course will train your already inquisitive mind how to emulate real world threat actors. It’s fast paced...

    Read more

Error

Error

No results found

No results found that match your query

Loading results