Assuming machine account identities.
Using sigreturn() to execute code.
Attacking 802.1x port authentication.
Exploiting Cisco IOS Extended Edition.
Leaking pointers from the Global Offset Table.
Exploiting dynamic DNS updates.
A look at various open source C2 agents.
Exploiting common Android vulnerabilities.
Configuring VXLan’s in Linux.
Bypassing Android certificate pinning using Objection.
Identifying common security issues in mobile applications.
Performing static analysis of Python & Java code.