Include Security Blog | As the ROT13 turns….
IncludeSec's free training in Buenos Aries for our Argentine hacker friends.
One of the things that has always been important in IncludeSec's progress as a company is finding the best talent for the task at hand....
Introducing: SafeURL - A set of SSRF Protection Libraries
Introducing: SafeURL - A set of SSRF Protection Libraries Code by IncludeSec team, with contributions by our Intern Mohammad Al Amin At ...
Strengths and Weaknesses of LLVM's SafeStack Buffer Overflow Protection
by Samuel Groß Introduction In June 2015 , a new memory corruption exploit mitigation named SafeStack was merged into the llvm developme...
Firmware dumping technique for an ARM Cortex-M0 SoC
by Kris Brosch One of the first major goals when reversing a new piece of hardware is getting a copy of the firmware. Once you have access...
A light-weight forensic analysis of the AshleyMadison Hack
by Erik Cabetas -----------[Intro] So Ashley Madison(AM) got hacked, it was first announced about a month ago and the attackers claimed ...
View web version