Bug Bounty For Beginners

MehediHasanRemon 3 years ago

Vulnerability assessment and penetration testing

Abu Sadat Mohammed Yasin 5 years ago

VAPT - Vulnerability Assessment & Penetration Testing

Netpluz Asia Pte Ltd 4 years ago

Intrigue Core: Scaling Assessment Automation

Jonathan Cran 3 years ago

JWT: jku x5u

snyff 3 years ago

Project scheduling and tracking

yenohhoney 11 years ago

OWASP Nagpur Meet #3 RF Hacking 101

OWASP Nagpur 5 years ago

Controlling Bluetooth Low Energy Devices

Keerati Torach 4 years ago

RF Hacking Red Pill 2017

Keerati Torach 6 years ago

HACKING THE WIRELESS WORD WITH SOFTWARE DEFINED RADIO

chandanpatelvns1947 8 years ago

Radio hacking - Part 1

nullowaspmumbai 6 years ago

Cybertort Imp Slides For Pub. Internet

Prof. (Dr.) Tabrez Ahmad 14 years ago

An overview of cyberimes

Prof. (Dr.) Tabrez Ahmad 13 years ago

Cybercrime investigation

Prof. (Dr.) Tabrez Ahmad 13 years ago

My presentation isv conference 7th jan 2011

Prof. (Dr.) Tabrez Ahmad 13 years ago

introduction to cyber law and cyber crime

Abhinav Tyagi 8 years ago