Example reports
Please note: these documents were written in a scholastic environment and are provided for educational purposes only.
Apr 10, 2022
Research paper on Docker and Kubernetes best security practices:
- Stolz docker and kubernetes security.pdf
- download it here
- MD5 hash: a7b628b2d7fdd335e1bdb4c4fc367030
- SHA256 hash: 5595095d91d945584c8ea4f474cf2b2d57fb2ddf5269ea78a9546ece662b3166
- Verified safe :) Virustotal
Pentest follow-up report:
- Stolz pentest report.pdf
- download it here
- MD5 hash: 7c58460f2a147ecf7728e1985b78a9e1
- SHA256 hash: a3c8cc09c717813d8800c8f869acb4002aac4aec9147377c2119c162b3601158
- Verified safe :) Virustotal
Threat Intelligence paper on APT28
- Stolz APT 28 TI.pdf
- download it here
- MD5 hash: e9aba83e452c763e745a12ff2a4b4c61
- SHA256 hash: 8e40c604b799e8ea8fb420090fcbd8723177104aa03e519fb1dd007278028c51
- Verified safe :) Virustotal