1Silly proof of concept: Anti-phishing using perceptual hashing algorithms (opens in new tab)(anvilsecure.com)3santaragolabs4y ago0
2Anti-phishing using perceptual hashing algorithms (opens in new tab)(anvilsecure.com)2santaragolabs4y ago1
4Defeating Secure Boot with Symlink Attacks (opens in new tab)(anvilventures.com)1santaragolabs5y ago0
5Unpacking Bosch Surveillance Camera Firmware (opens in new tab)(anvilventures.com)5santaragolabs5y ago0
6A bug and a misconfigured file share: a tale in two parts (opens in new tab)(anvilventures.com)1santaragolabs6y ago0
7Looking Inside the Box: Reverse Engineering the Dropbox Client (opens in new tab)(anvilventures.com)5santaragolabs6y ago0
9Infosec ethics in zero days, exploits and attribution (opens in new tab)(anvilventures.com)4santaragolabs8y ago1
10Saving Polar Bears When Banner Grabbing (opens in new tab)(blog.ioactive.com)5santaragolabs10y ago0
11Saving Polar Bears When Banner Grabbing (opens in new tab)(blog.ioactive.com)3santaragolabs10y ago0