A recently recorded run-through of our popular session providing an overview on the Dark Web.
A walk-through demo of exploiting web application vulnerabilities on an example site we built.
This blog introduces a new tool we've developed to help with reverse-engineering file formats, and demonstrates its use in reverse engineering a file format for a video game.
Access cards are used everywhere on a day to day business, ranging from highly secure facilities to medium scale enterprises to small businesses. Most access cards use some kind of Radio Frequency ID (RFID) technology.
Analysis of the Nanocore Remote Access Trojan