- Presentations
- Documents
- Infographics
An Abusive Relationship with AngularJS
Mario Heiderich
•
8 years ago
Ekoparty 2017 - The Bug Hunter's Methodology
bugcrowd
•
6 years ago
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iCloud Keychain
DefconRussia
•
9 years ago
Alexey Sintsov- SDLC - try me to implement
DefconRussia
•
9 years ago
[3.3] Detection & exploitation of Xpath/Xquery Injections - Boris Savkov
OWASP Russia
•
8 years ago
Database Firewall from Scratch
Denis Kolegov
•
6 years ago
SibeCrypt 2016. Практические методы защиты веб-приложений
Denis Kolegov
•
7 years ago
Injecting Security into vulnerable web apps at Runtime
Ajin Abraham
•
7 years ago
Security Code Review for .NET - Sherif Koussa (OWASP Ottawa)
OWASP Ottawa
•
10 years ago
Mobile Application Security Code Reviews
Denim Group
•
12 years ago
«Статический анализ: гордость и предубеждения», Алексей Кузьменко, аналитик ИБ Digital Security
Mail.ru Group
•
7 years ago
Application Security Workshop
Priyanka Aash
•
8 years ago
The System of Automatic Searching for Vulnerabilities or how to use Taint Analysis to find vulnerabilities
Positive Hack Days
•
11 years ago
2012 04 Analysis Techniques for Mobile OS Security
Raleigh ISSA
•
11 years ago
Dytan: A Generic Dynamic Taint Analysis Framework (ISSTA 2007)
James Clause
•
10 years ago
Taint analysis
Edgar Barbosa
•
13 years ago
Прикладная теория Application Security
Vladimir Kochetkov
•
8 years ago
Современные подходы к SAST
Vladimir Kochetkov
•
8 years ago
.NET for hackers
Antonio Parata
•
9 years ago