Popping Blisters for research: An overview of past payloads and exploring recent developments.D0nut encrypt me, I have a wife and no backups.Post-exploiting a compromised etcd – Full control over the cluster and its nodes.
Demystifying Cobalt Strike’s “make_token” Command.Don’t throw a hissy fit defend against Medusa.Public Report – WhatsApp Auditable Key Directory (AKD) Implementation Review.The Spelling Police: Searching for Malicious HTTP Servers by Identifying Typos in HTTP Responses.Is this the real life? Is this just fantasy? Caught in a landslide, NoEscape from NCC Group.Technical Advisory: Adobe ColdFusion WDDX Deserialization Gadgets.