Technical | Adversary Simulation

Exploiting Trusted Hosts in WinRM

Technical | Network Pentesting

Testing Applications for DLL Preloading Vulnerabilities

Technical | Mobile Application Pentesting

Android Exploitation Technical Paper Release

Technical | Web Application Pentesting

Thoughts on Web Application Firewalls

Technical | Network Pentesting

UPEK + Lenovo = Insecure Password Storage

Technical | Thick Application Pentesting

Pentesting Java Thick Applications with Burp JDSer

Technical | Vulnerability Management

BYOD & Security Assessments