Mobile Defense-in-Dev (Depth)

4 years ago 176 Views

The CARzyPire - Another Red Team Operation

4 years ago 211 Views

Cyber Kill Chain: Web Application Exploitation

4 years ago 724 Views

Mobile App Hacking In A Nutshell

5 years ago 235 Views

Jump-Start The MASVS

5 years ago 380 Views

OWASP Mobile Top 10 Deep-Dive

5 years ago 1394 Views

The Hookshot: Runtime Exploitation

6 years ago 1429 Views

Understanding ransomware

6 years ago 334 Views

OWASP Day - OWASP Day - Lets secure!

7 years ago 1791 Views

Owasp Top 10 Mobile Risks

8 years ago 2782 Views

Point-Of-Sale Hacking - 2600Thailand#20

8 years ago 1460 Views

OWASP Thailand-Beyond the Penetration Testing

9 years ago 1469 Views

Mobile Application Pentest [Fast-Track]

9 years ago 3940 Views

Hack and Slash: Secure Coding

10 years ago 4500 Views

CDIC 2013-Mobile Application Pentest Workshop

11 years ago 1987 Views

Web Application Firewall: Suckseed or Succeed

11 years ago 8892 Views

Layer8 exploitation: Lock'n Load Target

12 years ago 573 Views

Advanced Malware Analysis

12 years ago 1894 Views

Tisa mobile forensic

12 years ago 1195 Views