Skip content

1 10 152 results

Filter by

  • Binary Ninja Plugin

    Recently, in response to a customer incident we needed to reverse engineer a malware sample of WhiteRabbit ransomware...

    Read more
  • This Badge is My Badge

    When it comes to covert entry assessments, successfully capturing RFID badge values can mean the difference between failure...

    Read more
  • Version Tracking in Ghidra

    When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s...

    Read more
  • Penetration Testing

    We are looking for passionate and skilled penetration testers with professional experience. There are multiple roles available...

    Read more
  • Accelerator Program

    Do you want a job in cyber security but don’t know how to break into the industry? Tired...

    Read more
  • CVE-2018-13442: SolarWinds NPM SQL Injection

    A SQL injection vulnerability has been discovered in SolarWinds’ Network Performance Monitor (NPM).  This vulnerability has been designated...

    Read more
  • Vulnerabilities in AI Agents

    LLMs are becoming increasingly accessible to everyone. It is very easy to create your own LLM system, however...

    Read more
  • Detecting PoshC2 - Indicators of Compromise

    As a counterpart to the release of PoshC2 version 6.0 we are providing a list of some of...

    Read more
  • Flaw in PuTTY P-521 ECDSA signature generation leaks SSH...

    This article provides a technical analysis of CVE-2024-31497, a vulnerability in PuTTY discovered by Fabian Bäumer and Marcus Brinkmann...

    Read more
  • Introducing SharpConflux

    Today, we are releasing a new tool called SharpConflux, a .NET application built to facilitate Confluence exploration. It...

    Read more

Error

Error

No results found

No results found that match your query

Loading results