2016 Needle V0.1.1 Released iOS 9: Effective Jailbreak Needle V0.0.4 Released Needle Status Update A quick intro to Needle Introducing Needle
2017 Docker + Consul + Vault: A Practical Guide Needle meets Jenkins: how to include Needle in your CI pipeline Needle v1.0.0 released: new native agent and support for iOS 10
2018 Critical Vulnerability in Kubernetes API Server (CVE-2018-1002105) Red Teaming Mind Map from The Hacker Playbook 3 My Arsenal of Cloud Native (Security) Tools Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933) So I Heard You Want to Learn Kubernetes GoScan v2 Offensive Infrastructure: Introduction to Consul Offensive ELK: Elasticsearch for Offensive Security Robtex-Go: Go Client for the Robtex API Introducing GoScan (aka a reason to learn Go) Burp Pro as a Docker Container
2019 Cross Account Auditing in AWS and GCP Introducing CloudSecList.com Deploy Your Own Kubernetes Lab Offensive Infrastructure: the HashiStack
2020 Semgrep for Cloud Security Introducing CloudSecDocs.com Domain-Wide Delegation of Authority in GSuite Tracking Moving Clouds: How to continuously track cloud assets with Cartography So I Heard You Want to Learn Kafka The Current State of Kubernetes Threat Modelling Building a Serverless Mailing List in AWS My Blogging Stack Remote Development with a Chromebook in 2020 Mapping Moving Clouds: How to stay on top of your ephemeral environments with Cartography
aws Semgrep for Cloud Security Introducing CloudSecDocs.com Tracking Moving Clouds: How to continuously track cloud assets with Cartography Building a Serverless Mailing List in AWS My Blogging Stack Mapping Moving Clouds: How to stay on top of your ephemeral environments with Cartography Cross Account Auditing in AWS and GCP My Arsenal of Cloud Native (Security) Tools
cloud Semgrep for Cloud Security Introducing CloudSecDocs.com Domain-Wide Delegation of Authority in GSuite Tracking Moving Clouds: How to continuously track cloud assets with Cartography So I Heard You Want to Learn Kafka Building a Serverless Mailing List in AWS My Blogging Stack Mapping Moving Clouds: How to stay on top of your ephemeral environments with Cartography Cross Account Auditing in AWS and GCP Introducing CloudSecList.com
development Building a Serverless Mailing List in AWS My Blogging Stack Remote Development with a Chromebook in 2020
devops Semgrep for Cloud Security Introducing CloudSecDocs.com Tracking Moving Clouds: How to continuously track cloud assets with Cartography So I Heard You Want to Learn Kafka Mapping Moving Clouds: How to stay on top of your ephemeral environments with Cartography Introducing CloudSecList.com Deploy Your Own Kubernetes Lab Offensive Infrastructure: the HashiStack My Arsenal of Cloud Native (Security) Tools So I Heard You Want to Learn Kubernetes Offensive Infrastructure: Introduction to Consul
docker Introducing CloudSecDocs.com Deploy Your Own Kubernetes Lab Offensive Infrastructure: the HashiStack My Arsenal of Cloud Native (Security) Tools So I Heard You Want to Learn Kubernetes GoScan v2 Offensive Infrastructure: Introduction to Consul Offensive ELK: Elasticsearch for Offensive Security Burp Pro as a Docker Container Docker + Consul + Vault: A Practical Guide
elasticsearch Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933) Offensive ELK: Elasticsearch for Offensive Security
exploit Critical Vulnerability in Kubernetes API Server (CVE-2018-1002105) Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)
gcp Semgrep for Cloud Security Introducing CloudSecDocs.com Domain-Wide Delegation of Authority in GSuite Tracking Moving Clouds: How to continuously track cloud assets with Cartography Mapping Moving Clouds: How to stay on top of your ephemeral environments with Cartography Cross Account Auditing in AWS and GCP
hashistack Offensive Infrastructure: the HashiStack Offensive Infrastructure: Introduction to Consul Docker + Consul + Vault: A Practical Guide
iOS Needle meets Jenkins: how to include Needle in your CI pipeline Needle v1.0.0 released: new native agent and support for iOS 10 Needle V0.1.1 Released iOS 9: Effective Jailbreak Needle V0.0.4 Released Needle Status Update A quick intro to Needle Introducing Needle
infrastructure Domain-Wide Delegation of Authority in GSuite Tracking Moving Clouds: How to continuously track cloud assets with Cartography Mapping Moving Clouds: How to stay on top of your ephemeral environments with Cartography Deploy Your Own Kubernetes Lab Offensive Infrastructure: the HashiStack Offensive Infrastructure: Introduction to Consul
kubernetes Semgrep for Cloud Security Introducing CloudSecDocs.com The Current State of Kubernetes Threat Modelling Introducing CloudSecList.com Deploy Your Own Kubernetes Lab Critical Vulnerability in Kubernetes API Server (CVE-2018-1002105) My Arsenal of Cloud Native (Security) Tools So I Heard You Want to Learn Kubernetes
needle Needle meets Jenkins: how to include Needle in your CI pipeline Needle v1.0.0 released: new native agent and support for iOS 10 Needle V0.1.1 Released Needle V0.0.4 Released Needle Status Update A quick intro to Needle Introducing Needle
pentest Red Teaming Mind Map from The Hacker Playbook 3 My Arsenal of Cloud Native (Security) Tools Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933) GoScan v2 Offensive Infrastructure: Introduction to Consul Offensive ELK: Elasticsearch for Offensive Security Robtex-Go: Go Client for the Robtex API Introducing GoScan (aka a reason to learn Go) Burp Pro as a Docker Container