- (note) Finding vulnerabilities with LLMs
- (note) The nx Breach
- How to Sell to Security Teams
- Foundations of a Multi-Cloud Security Strategy
- The Quirks of Apps Script and Google Cloud
- Google Cloud Service Accounts Security Best Practices
- A Practical Introduction to Container Security
- Google Cloud IAM for Security Teams
- A Collection of Cloud Security Tools
- How to find and delete idle GCP Projects
- Docker Security Best Practices from the Dockerfile
- Shared Responsibility Models for Public Clouds
- Lateral Movement in the Cloud
- Stricter Access Control to Google Cloud Registry
- (note) TR19: Distributed Security Alerting
- Forseti: Stepping Up the Cloud Security Game
- Google Cloud Security Toolbox
- Advanced Techniques for Detecting RAT Screen Control
- Beyond Superfish: a Journey on SSL MitM in the Wild
- FakeCommerce, an exercise in OSINT
- (note) WordCamp Italy 2013: Lo Stato della Sicurezza nell'Ecosistema di Wordpress
- Vulnerable SWF Bundled in 40 Wordpress Plugins
- DOM XSS Honeypot
- Hunting Wordpress Exploitation in the Wild
- DLL and Code Injection in Python
- What's New in xsssniper 0.8.x
- WordPress Shortcode Redirect <= 1.0.01 Stored XSS
- WordPress Mingle Forum <= 1.0.32.1 Multiple Vulnerabilities
- WordPress uCan Post <= 1.0.09 Stored XSS
- WordPress Age Verification <= 0.4 Open Redirect
- WordPress Pay With Tweet <= 1.1 Multiple Vulnerabilities
- (note) A Simple Debugger
- Introducing xsssniper
- Tor + Polipo on OpenBSD
- (note) Pastebin v3 Command Line Script
- Run Xmonad on Snow Leopard
- Introducing Pepbot
- (note) How To Automate SSH With Expect
- (note) FreeBSD Root Password Recover