open-menu
closeme
Home
Books
Links
Kaishakunin.com - My main website
Cryptomancer.de - Cryptography stuff
Mastodon
CodeBerg
About
codeberg
mastodon
rss
Building Your Own Web Application Firewall as a Service
And Forgetting about False Positives
calendar
Jun 25, 2020
· 4 min read
·
deepsec
waf
web-application-firewall
security-architecture
web-application
·
Share on:
twitter
facebook
linkedin
copy
BitCracker
BitLocker meets GPUs
calendar
Nov 9, 2019
· 3 min read
·
editor
bitlocker
hash
sha-256
aes
gpu
cuda
cryptographicattack
passwordcracking
·
Share on:
twitter
facebook
linkedin
copy
Drones, the New Threat from the Sky
calendar
Oct 17, 2019
· 2 min read
·
-
editor
drones
risks
countermeasures
critical-infrastructure
risk-management
signal-hacking-and-disruption
·
Share on:
twitter
facebook
linkedin
copy
Defense Informs Offense Improves Defense
How to Compromise an Industrial Control Systems Network – and How to Defend it
calendar
Sep 15, 2019
· 3 min read
·
editor
ics
industrial-control-systems
trisis
crashoverride
malware
pentest
penetration-testing
blackenergy
·
Share on:
twitter
facebook
linkedin
copy
Efail and other Failures with Encryption and E-Mail
Outdated Crypto Standards and HTML Mails as a Security Risk
calendar
Sep 2, 2019
· 3 min read
·
-
editor
mail
encryption
gnupg
pgp
smime
cryptography
html
·
Share on:
twitter
facebook
linkedin
copy
New Attack Vectors for Mobile Core Networks
calendar
Aug 5, 2019
· 2 min read
·
-
editor
ipx
ss7
interconnection
diameter
charging
4g
5g-mobile-network
·
Share on:
twitter
facebook
linkedin
copy
Without a Trace
Cybercrime, who are the Defendants?
calendar
Jun 29, 2019
· 2 min read
·
-
editor
cybercrime
law
unsolved-cases
·
Share on:
twitter
facebook
linkedin
copy
XFLTReaT
Unified Tunneling
calendar
May 11, 2019
· 2 min read
·
-
editor
malware
web-application-firewalls
penetration-testing
bypass-techniques
ethical-hacking
red-team
·
Share on:
twitter
facebook
linkedin
copy
Web Application Firewall Bypassing
An Approach for Penetration Testers
calendar
Apr 5, 2019
· 2 min read
·
-
editor
malware
web-application-firewalls
penetration-testing
bypass-techniques
ethical-hacking
red-team
·
Share on:
twitter
facebook
linkedin
copy
Malware Analysis
Machine Learning Approaches
calendar
Nov 17, 2018
· 2 min read
·
-
editor
malware
machine-learning
malware-analysis
deep-learning
·
Share on:
twitter
facebook
linkedin
copy
««
«
1
2
3
4
5
»
»»