- Presentations
- Documents
- Infographics
Understanding Cross-site Request Forgery
Daniel Miessler
•
10 years ago
Adaptive Testing Methodology [ ATM ]
Daniel Miessler
•
8 years ago
IT Security Awareness Tips
Luke O'Connor
•
10 years ago
Securing the Container Pipeline
Salesforce Engineering
•
7 years ago
Asegúr@IT III - Técnicas de protección de Software y Cracking
Chema Alonso
•
15 years ago
Автоматизация отладки в windbg
Positive Hack Days
•
8 years ago
Александр Тарасенко, Использование python для автоматизации отладки С/C++ кода в Windows
Sergey Platonov
•
8 years ago
Crash (or) Hang dump analysis using WinDbg in Windows platform by K.S.Shanmugasundaram
Shanmuga KS
•
10 years ago
The known unknowns of SS7 and beyond
Siddharth Rao
•
8 years ago
RSA Conference 2010 San Francisco
Aditya K Sood
•
13 years ago
Overview of Python - Bsides Detroit 2012
Tazdrumm3r
•
11 years ago
[Defcon24] Introduction to the Witchcraft Compiler Collection
Moabi.com
•
7 years ago
DDoS mitigation EPIC FAIL collection - 32C3
Moshe Zioni
•
8 years ago
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON
•
8 years ago
Reversing and Malware Analysis
E Hacking
•
10 years ago
Practical Malware Analysis: Ch 9: OllyDbg
Sam Bowne
•
8 years ago
Tương lai thị trường Bất động sản
Tuan Nguyen
•
7 years ago
Protecting browsers’ secrets in a domain environment
Itai Grady
•
7 years ago
Применение виртуализации для динамического анализа
Positive Hack Days
•
7 years ago
Обход файрволов веб-приложений
Positive Hack Days
•
7 years ago