Florentine A
GO Forth And Reverse
Koadic C3 - Windows COM Command & Control Framework
The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirect Wireless Pivots
Microservices And FaaS For Offensive Security
Zero Trust Networks: In Theory and in Practice
SniffAir – An Open-Source Framework for Wireless Security Assessments
Writing Malware Without Writing Code
YARA-as-a-Service (YaaS): Real-Time Serverless Malware Detection
CheckPlease - Payload-Agnostic Implant Security
Network Forensic Analysis in an Encrypted World
Abusing Webhooks for Command and Control
SECSMASH: Using Security Products to own the Enterprise'
Modern Internet-Scale Network Reconnaissance
Vaccination - An Anti-Honeypot Approach
Lessons from the front lines: New York City Cyber Command