JohnLaTwC's
repositories
|
Presentations
|
Yara
|
img
|
notebooks
|
scripts
|
Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win.md
|
How InfoSec Security Controls Create Vulnerability.md
|
README.md
|
The Inside Story Behind MS08-067.md
|