Technical | Adversary Simulation

The Value of Detective Controls

Technical | Vulnerability Management

Firewall Configuration Review

Technical | Thick Application Pentesting

Binrev- Automate Reversing Windows Binaries for Pentesters

Technical | Network Pentesting

Identifying Rogue NBNS Spoofers