Name | Last modified | Size | |
---|---|---|---|
Parent Directory | - | ||
DBI Frameworks Applied to Computer Security - Uses and Comparative.pdf | May-29-2016 22:50 | 3 Mo | |
HiP2k13-Burp_Pro_Tips_and_Tricks.pdf | May-29-2016 22:50 | 3 Mo | |
Malware vs Virtualization - The endless cat and mouse play.pdf | May-29-2016 22:50 | 12 Mo | |
Next Generation Rootkits for ARM Based Devices.pdf | May-29-2016 22:50 | 6 Mo | |
Origin Policy Enforcement in Modern Browsers.pdf | May-29-2016 22:50 | 1 Mo | |
Remoting Android Applications for Fun and Profit.pdf | May-29-2016 22:50 | 731 Ko | |
The Inner HTML Apocalypse - How MXSS Attacks Change Everything We Believed to Know so Far.pdf | May-29-2016 22:50 | 2 Mo | |
Web Applications Forensics.pdf | May-29-2016 22:50 | 1 Mo | |
Windows-Phone-8-application-security-slides.pdf | May-29-2016 22:50 | 970 Ko | |