back to top

space

CTF – NahamCon 2025

Live and playable CTF Archives continue to come out of the vault including one that just happened! Enjoy the ability to continue playing the NahamCon 2025 CTF at your own pace. There are 30 challenges of...

UC – Google Dorking

Before we ever touch a target system directly, a significant portion of a penetration test involves meticulous reconnaissance. This is where we act as digital detectives, using publicly available resources to uncover clues about...

UC – Space Security

While transitioning from the government-dominated "Old Space" to the private sector focused "New Space", old cybersecurity challenges are joined by a plethora of new concerns. From setting the stage and reviewing specific case studies...

UC – AWS Security

AWS secures the physical data centers and hypervisors, but customers own the identity, configuration, encryption, and monitoring layers. Mastering this shared‑responsibility model means designing least privilege on day one, isolating workloads by account, and wiring continuous detection so...