Drop me a line to say hello or ask a question. If you would like a response, please provide your email address.
Purple Team Tactics: Simulating Supply Chain Attacks With DLL Hijacking
2020 Conference Talks
Live off the Land and Crack the NTLMSSP Protocol
Red Team Tradecraft: Loading Encrypted C# Assemblies In Memory
Hooking Linux Libraries for Post-Exploitation Fun
Build a Raspberry Pi Powered Arcade Machine!
Build an Arduino Word Clock
Hacking My House #1: Building a Musical Arduino Doorbell
Moving Your Landline To Google Voice
The Rockmite: A 40 meters CW QRP Rig (in an Altoids Tin)
S3 Buckets: Now With Both Leak & Fill Vulnerability
Stealing Data With CSS: Attack and Defense
Move Over S3: Open Directory Indexes Continue to be a Problem
Security Researchers Lose a Favorite DNS Recon Tool Jan 2018
KRACK: How To Protect Yourself on a Flawed Network
Equifax, SEC, & Now Deloitte: Organizations Must Employ Offensive Security
Equifax Redux Part 1: Assume You Are Already Compromised
Chaining Remote Web Vulnerabilities to Abuse Let's Encrypt
Visit makeRF, my website devoted to amateur radio experments and electronics.