![]() | Name | Last modified | Size |
---|---|---|---|
![]() | Parent Directory | - | |
![]() | DBI Frameworks Applied to Computer Security - Uses and Comparative.pdf | May-29-2016 22:50 | 3 Mo |
![]() | HiP2k13-Burp_Pro_Tips_and_Tricks.pdf | May-29-2016 22:50 | 3 Mo |
![]() | Malware vs Virtualization - The endless cat and mouse play.pdf | May-29-2016 22:50 | 12 Mo |
![]() | Next Generation Rootkits for ARM Based Devices.pdf | May-29-2016 22:50 | 6 Mo |
![]() | Origin Policy Enforcement in Modern Browsers.pdf | May-29-2016 22:50 | 1 Mo |
![]() | Remoting Android Applications for Fun and Profit.pdf | May-29-2016 22:50 | 731 Ko |
![]() | The Inner HTML Apocalypse - How MXSS Attacks Change Everything We Believed to Know so Far.pdf | May-29-2016 22:50 | 2 Mo |
![]() | Web Applications Forensics.pdf | May-29-2016 22:50 | 1 Mo |
![]() | Windows-Phone-8-application-security-slides.pdf | May-29-2016 22:50 | 970 Ko |