Porting your favourite cmdline tool to Android
Getting access to Lantronix devices: exploring treasures of 77FEh at Confidence 2014
Ripping web accessible .git files
Perl Usage In Security and Penetration testing
Cryptography implementation weaknesses: based on true story
Wonderful world of (distributed) SCM or VCS