ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Personal Information
Occupation
Cyber Security Consultant
Industry
Technology / Software / Internet
Website
Contact Details

Presentations(28)Ìý

See all
Malware for Red Team
Malware for Red TeamMalware for Red Team
Malware for Red Team
Ìý
Down The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security ProfessionalDown The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security Professional
Ìý
MITM: Tales of Trust and Betrayal
MITM: Tales of Trust and BetrayalMITM: Tales of Trust and Betrayal
MITM: Tales of Trust and Betrayal
Ìý

Documents(4)Ìý

See all
Silabus Training Reverse Engineering
Silabus Training Reverse EngineeringSilabus Training Reverse Engineering
Silabus Training Reverse Engineering
Ìý
If3058 concept and design of genetic cryptography using bdg48
If3058 concept and design of genetic cryptography using bdg48If3058 concept and design of genetic cryptography using bdg48
If3058 concept and design of genetic cryptography using bdg48
Ìý
Makalah if3051-2012-098
Makalah if3051-2012-098Makalah if3051-2012-098
Makalah if3051-2012-098
Ìý