Toggle navigation
TWunroll
TWunroll
faq
Contact US
#Redteam
Jorge Orchilles 🦄
jorgeorchilles
Are you building a Red Team Program this year? I support the idea! Here are some recent blog posts to help you build your case with management:10 Benefits of Red
Read more
Clint Gibler
clintgibler
tl;dr sec 40* Uber's continuous AWS monitoring* #AWS's hands-off deployments* Auto-remove unneeded feature flags* @PhilippeDeRyck on OAuth/OpenID Connect* @gerben_javado extract endpoints/params & @m4ll0k2 find sensitive data fr
Read more
christmas2016_passwords.xlsm
da_667
Since others are allowed to throw their theories around on how fireye got popped, here's mine. You know that VMware advisory that was posted a few days ago? https://www.vmware.com/security/advisories/VMSA-2020-0027.htmlThe one
Read more
Alex Gough
quidity
Few steps are needed to turn this access into an effective cyberweapon. Gathering information was more important in this case, but also probably triggered the investigation. What will we call
Read more
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree