Hide filtersShow filters Clear allArticlesVulnerabilities × Close ToolsArticlesDecember 10, 2025Extending Burp Suite for fun and profit – The Montoya way – Part 9by Federico Dotta ArticlesExploitsNovember 11, 2025Groovy Template Engine Exploitation – Notes from a real case scenario, part 2by Gianluca Baldi ToolsArticlesOctober 28, 2025Brida 0.6 released!by Federico Dotta ArticlesToolsOctober 14, 2025Streamlining Vulnerability Research with the idalib Rust Bindings for IDA 9.2by Marco Ivaldi ArticlesJuly 29, 2025Attacking GenAI applications and LLMs – Sometimes all it takes is to ask nicely!by Federico Dotta VulnerabilitiesJuly 8, 2025Export to PDF allows local file inclusion/path traversal in Microsoft 365by Gianluca Baldi ArticlesJune 18, 2025Fault Injection – Follow the White Rabbitby Maurizio Agazzini VulnerabilitiesArticlesEventsMay 6, 2025My Zero Day Quest & BlueHat Podcastby Marco Ivaldi ExploitsVulnerabilitiesApril 23, 2025Local privilege escalation on Zyxel USG FLEX H Series (CVE-2025-1731)by Marco Ivaldi