Other years available: 2025,2024,2023,2022,2021,2020,2019
Posts
- 
        How to polish and finish lockpicks
- 
        Honest Dong Dimple Picks Review
- 
        Sparrows BlackFlags Review
- 
        Locking Down S3 Public Access
- 
        PDF Analysis
- 
        The Revolver
- 
        When Resilience Fails, Don't Panic!
- 
        Werkzeug Debugger
- 
        MSF Meterpreter and Railgun
- 
        Kibana, Wazuh and Bro IDS
- 
        Hacking MongoDB
- 
        Hunt for AWS Unrestricted E/In-gress
- 
        Roll your own AWS Lambda in 5 easy steps
- 
        Defend against Domain-Fronting with JA3
- 
        Cracking WPA1/2/Enterprise with HCXTools
- 
        Updating GuardDuty Threatlists with Serverless
- 
        Trello vs the Google Dork
- 
        Red-Teaming and the Importance of Failing!
- 
        Exploiting Local File Includes
- 
        AWS — Scrap those bastion hosts
- 
        Secret Holes Behind the Common Load-Balancer
- 
        OSINT & Social Engineering the Dangers
- 
        Postgres Hacking Part 2 — Code Execution
- 
        Pentesters Guide to PostgreSQL Hacking
- 
        Rise of the Crypto Miner Malware
- 
        Oracle Hacks — Part 2
- 
        Pentesters Guide to Oracle Hacking
- 
        Adding Security Headers to S3 Websites
- 
        Cracking Mifare with the Super-Card
- 
        Hacking Digital Signs for Fun (and no profit!)
- 
        Kali-Linux AMI & AWSLogs
- 
        AWS and VPC Endpoints (PrivateLinks)
- 
        JSON Web Token Pentesting
- 
        Keysy LF RFID Hacking Made Easy
- 
        Kubernetes or KuberPwn
- 
        AWS: Linking EC2 logs to Cloudwatch
- 
        HTTP Public Key Pinning (HPKP)
- 
        What are CAA Records and their use with HTTPS Websites
- 
        Zigbee & Killerbee
- 
        Azure Blob Storage
- 
        Google S3 Secure Storage
- 
        S3 Security: Leaky Bucket Prevention Primer
- 
        Hacking IPv6 from Windows
- 
        Hacking IPv6 a Primer
- 
        Offensive Implants Part 2
- 
        Offensive Implants Part 1
- 
        Dridex Loader Technique Used For MSF Shells
- 
        Detecting and Tracking the Red-Team
- 
        Google Storage Mining
- 
        Defeating the Masterlock 5401-5403
- 
        Powershell that looks & smells like Empire Payloads
- 
        Malware Samples to Powershell Payloads