- Mr. Robot hacking challenge
- Tommy Boy hacking challenge
- Necromancer hacking challenge
- The Pentesters: 64-Bit AppSec Primer (Beta) hacking challenge
- DC416: Toronto's DEF CON chapter
- Milnet hacking challenge
- 64-bit Linux stack smashing tutorial
- Radare 2 in 0x1E minutes
- Fristileaks hacking challenge
- CSAW CTF Quals 2015 Autobots writeup
- A ROP primer solution
- NullByte 0x01 hacking challenge
- Brainpan 3 hacking challenge
- Simplifying format string exploitation with libformatstr
- 64-bit Linux stack smashing tutorial: Part 2
- 64-bit Linux stack smashing tutorial: Part 1
- Sokar hacking challenge
- OverTheWire: Behemoth writeup
- Pegasus hacking challenge
- The Offensive Security Playground
- Knock-Knock hacking challenge
- OwlNest hacking challenge
- Flick hacking challenge
- Xerxes 2 hacking challenge
- Hell hacking challenge
- Hades hacking challenge
- From fuzzing to 0-day
- Multi-factor authentication with SSH on OS X
- Leaving Blogger and moving to GitHub Pages
- Kioptrix hacking challenge: Part 5
- De-ICE hacking challenge: Part 6
- De-ICE hacking challenge: Part 5
- De-ICE hacking challenge: Part 4
- Relativity hacking challenge
- Creating a virtual machine hacking challenge
- Brainpan 2 contest winner
- Brainpan 2 hacking challenge
- Thoughts on Offensive Security's Cracking the Perimeter course
- Brainpan hacking challenge
- Building Unicornscan in Kali Linux 1.0
- Binary to shellcode
- Introduction to pivoting, Part 4
- Introduction to pivoting, Part 3
- Introduction to pivoting, Part 2
- Introduction to pivoting, Part 1
- Growl style for Chrome notifications
- Parsing Nmap's output
- Thoughts on Offensive Security's Penetration Testing with Backtrack course
- Loophole hacking challenge
- VulnImage hacking challenge
- Kioptrix hacking challenge: Part 3
- Kioptrix hacking challenge: Part 2
- Kioptrix hacking challenge: Part 1
- Let's kick shell-ish, Part 2
- Let's kick shell-ish, Part 1
- Port scanning one, two punch
- Wireshark OS X
- Staying anonymous in a social Internet
- Holynix hacking challenge: Part 2
- Holynix hacking challenge: Part 1
- De-ICE hacking challenge: Part 3
- De-ICE hacking challenge: Part 2
- De-ICE hacking challenge: Part 1
- Creating a user name list for brute force attacks
- Setting up a malicious wireless access point
- Sniffing website login credentials
- Cracking MoinMoin Wiki Passwords
- Securely delete files and folders from Finder
- Bypassing MAC filters on WiFi networks
- Capturing the WPA handshake using mass deauthentication
- EmDeeFive
- Rooting the Samsung Galaxy Spica
- Remote control your computer with Dropbox
- Deactivate screensavers simultaneously on multiple Macs
- Activate screensavers simultaneously on multiple Macs
- Functions for sending email
- Birthday code cake
- Samsung Galaxy Spica
- Automating the checkmate of WiFi WEP networks
- One triple grande non-fat wireless hack please!
- Fight scareware
- iTunes. Genres? Wikipedia!
- The adaptive firewall
- Where are you?