Hack, Patch, Repeat: Rényi & Tsallis Entropy for Continuous Offensive-Defensive Cycles
11 Jun 2025 - Rhette Wallach
Your Byte Distribution Called: It Wants a Parameter Tweak
11 Jun 2025 - Rhette Wallach
Your Byte Distribution Called: It Wants a Parameter Tweak
04 Jun 2025 - Sofiane Talmat, Rhette Wallach
This is the first article in a series for binary data analysis. It provides an approach to using Entropy as a cost function for binary segmentation.
30 Apr 2025 - Rhette Wallach
Practical blue and red AI
07 Apr 2025 - Sofiane Talmat
This is is the first article in a series for binary data analysis. It is an introduction to entropy.
14 Jan 2025 - Sigmund Gorski
This post introduces SNulk, a solution that allows users to effortlessly submit large numbers of templated records to a table on a ServiceNow instance.
12 Nov 2024 - Sigmund Gorski
This blog post compares the static analysis library SootUp to its predecessor Soot to determine areas of improvement, areas that still need work, and how fit SootUp is to be used in actual tool development.
04 Nov 2024 - Sigmund Gorski
This blog post demonstrates Rhino Tracker, a solution for analyzing Rhino polyglot code.
28 Oct 2024 - Sam Shahsavar
We will review some lessons learned and tips for effectively fuzzing your applications with Jazzer.
06 Oct 2023 - Sam Shahsavar, with contributions from Sofiane Talmat
We will analyze and build a POC for CVE-2023-21967, a vulnerability in OpenJDK.
06 Sep 2023 - Paul Marrapese
Push verifications with an extra number challenge step have become a popular multi-factor authentication strategy. But, does this extra step actually offer any added protection against hackers?
05 Sep 2023 - Royce Davis
recently had the pleasure of attending DEFCON31 at Caesars Forum in Las Vegas. A few of us on the Red Team decided to...