Aggregator
Poison Ivy string decryption
9 months 2 weeks ago
Pip3line
9 months 2 weeks ago
Pip3line – The Swiss Army Knife of Byte Manipulation
9 months 2 weeks ago
POC2021 – Pwning the Windows 10 Kernel with NTFS and WNF Slides
9 months 2 weeks ago
Phishing Mitigations: Configuring Microsoft Exchange to Clearly Identify External Emails
9 months 2 weeks ago
Phishing Stories
9 months 2 weeks ago
Peeling back the layers on defence in depth…knowing your onions
9 months 2 weeks ago
Perfect Forward Security
9 months 2 weeks ago
PhanTap (Phantom Tap): Making networks spookier one packet at a time
9 months 2 weeks ago
PDF Form Filling and Flattening Tool Buffer Overflow
9 months 2 weeks ago
PeachFarmer
9 months 2 weeks ago
Payment Card Industry Data Security Standard (PCI DSS) A Navigation and Explanation of Changes from v2.0 to v3.0
9 months 2 weeks ago
Past, Present and Future of Effective C
9 months 2 weeks ago
Password and brute-force mitigation policies
9 months 2 weeks ago
Passive Information Gathering – The Analysis of Leaked Network Security Information
9 months 2 weeks ago
Paradoxical Compression with Verifiable Delay Functions
9 months 2 weeks ago
Passive Decryption of Ethereum Peer-to-Peer Traffic
9 months 2 weeks ago
Pairing over BLS12-381, Part 3: Pairing!
9 months 2 weeks ago
Paper: Thematic for Success in Real-World Offensive Cyber Operations – How to make threat actors work harder and fail more often
9 months 2 weeks ago