ºÝºÝߣ


Mobile Defense-in-Dev (Depth)

4 years ago • 182 Views

The CARzyPire - Another Red Team Operation

5 years ago • 212 Views

Cyber Kill Chain: Web Application Exploitation

5 years ago • 734 Views

Mobile App Hacking In A Nutshell

6 years ago • 238 Views

Jump-Start The MASVS

6 years ago • 388 Views

OWASP Mobile Top 10 Deep-Dive

6 years ago • 1453 Views

The Hookshot: Runtime Exploitation

7 years ago • 1439 Views

Understanding ransomware

7 years ago • 376 Views

OWASP Day - OWASP Day - Lets secure!

8 years ago • 1800 Views

Don't Trust, And Verify - Mobile Application Attacks

8 years ago • 382 Views

Owasp Top 10 Mobile Risks

8 years ago • 2789 Views

Point-Of-Sale Hacking - 2600Thailand#20

9 years ago • 1476 Views

OWASP Thailand-Beyond the Penetration Testing

10 years ago • 1474 Views

Mobile Application Pentest [Fast-Track]

10 years ago • 3947 Views

Hack and Slash: Secure Coding

11 years ago • 4511 Views

CDIC 2013-Mobile Application Pentest Workshop

11 years ago • 1991 Views

Web Application Firewall: Suckseed or Succeed

11 years ago • 8898 Views

Layer8 exploitation: Lock'n Load Target

12 years ago • 574 Views

Advanced Malware Analysis

12 years ago • 1900 Views

Tisa mobile forensic

12 years ago • 1203 Views