2021-01-07 | Rob VandenBrink | Using the NIST Database and API to Keep Up with Vulnerabilities and Patches (Part 1 of 3) |
2020-12-22 | Xavier Mertens | Malware Victim Selection Through WiFi Identification |
2020-09-02 | Xavier Mertens | Python and Risky Windows API Calls |
2020-08-18 | Xavier Mertens | Using API's to Track Attackers |
2020-07-28 | Johannes Ullrich | All I want this Tuesday: More Data |
2020-05-29 | Johannes Ullrich | The Impact of Researchers on Our Data |
2020-05-21 | Xavier Mertens | Malware Triage with FLOSS: API Calls Based Behavior |
2020-02-29 | Guy Bruneau | Hazelcast IMDG Discover Scan |
2020-01-16 | Bojan Zdrnja | Summing up CVE-2020-0601, or the Let?s Decrypt vulnerability |
2018-11-17 | Xavier Mertens | Quickly Investigating Websites with Lookyloo |
2018-11-12 | Rick Wanner | Using the Neutrino ip-blocklist API to test general badness of an IP |
2017-11-17 | Xavier Mertens | Top-100 Malicious IP STIX Feed |
2017-09-05 | Adrien de Beaupre | Struts vulnerability patch released by apache, patch now |
2017-05-10 | Johannes Ullrich | Read This If You Are Using a Script to Pull Data From This Site |
2015-09-03 | Xavier Mertens | Querying the DShield API from RTIR |
2014-05-28 | Rob VandenBrink | Assessing SOAP APIs with Burp |
2014-01-20 | Rob VandenBrink | You Can Run, but You Can't Hide (SSH and other open services) |
2012-11-16 | Guy Bruneau | VMware security updates for vSphere API and ESX Service Console - http://www.vmware.com/security/advisories/VMSA-2012-0016.html |
2010-03-30 | Pedro Bueno | Sharing the Tools |