Such Security. wow.
  • External Blog Posts and Recorded Talks
  • Tutorials
  • Vulnerability research

External Blog Posts and Recorded Talks

Blog Posts

Trend Micro Security Intelligence Blog

  • CVE-2019-11815 - A Cautionary Tale About CVSS Scores
  • CVE-2019-0725 - An Analysis of Its Exploitability

Zero Day Initiative Blog

  • CVE-2019-12643 - Cisco IOS XE Authentication Bypass Vulnerability
  • CVE-2020-0729 - Remote Code Execution Through LNK Files

Talks

  • N-Day Vulnerability Research: Denying Attackers Their Low Hanging Fruit - DecodePH 2018, Manila, Philippines
  • The Legend of Shortcuts: A LNK To the Past (Searches) - Hackers Academy HAVOC 2020, Virtual
  • EBS, TCF, SQLi, SMH: A cautionary take about undocumented protocols and whac-a-mole patching - OWASP Toronto December 2020 Event

ISSessions/Sheridan College

  • The Wonderful World of Information Security (2020 Edition)
  • More Than Meets The Eye: Training in Disguise - ISSessions 2021 CTF Keynote
  • An Introduction to N-Day Vulnerability Research (Workshop) - ISSessions 2021 CTF
  • Social

    • Twitter
    • Keybase
    • Mastodon
  • Links

    • Pelican
    • Python.org
    • Jinja2

© 2020 Thracky · Powered by pelican-bootstrap3, Pelican, Bootstrap

Back to top