Information you Provide as a buyer
Showing posts with label IT-Sec. Show all posts
Showing posts with label IT-Sec. Show all posts
Tuesday, July 26, 2016
User Input - Self-explanatory.
Credit Card Services
Using the SCMP API
Monday, July 25, 2016
ETHICAL HACKING 101 How to conduct professional pentestings in 21 days or less!
Understanding the hacker´s mind, making reconnaissance, scanning and
enumeration, exploiting vulnerabilities, writing a professional report and more!
By:
Karina Astudillo B.
BREAKING HTTPS WITH BGP HIJACKING
BREAKING HTTPS WITH BGP HIJACKING
By
Artyom Gavrichenkov
Qrator Labs (ag@qrator.net)
Understanding and Managing Entropy Usage
INTERNET PLUMBING FOR SECURITY PROFESSIONALS: THE STATE OF BGP SECURITY
INTERNET PLUMBING FOR SECURITY PROFESSIONALS: THE STATE OF BGP SECURITY
By
Wim Remes – Rapid7
Exploiting the DRAM rowhammer bug to gain kernel privileges
Exploiting the DRAM rowhammer bug to gain kernel privileges
Mark Seaborn, sandbox builder and breaker
with contributions by Thomas Dullien, reverse engineer
Exploiting Trustzone on Android
Exploiting Trustzone on Android
By
Di Shen(@returnsme) retme7@gmail.com
Attacking ECMAScript Engines with Redefinition
Attacking ECMAScript Engines with Redefinition
By
Natalie Silvanovich, Google
XXE defence(les)s in JDK XML parsers
XXE defence(les)s in JDK XML parsers
By
Sergey Gorbaty sergey.gorbaty@salesforce.com
Xiaoran Wang xiaoran.wang@salesforce.com
Hormazd Billimoria hbillimoria@salesforce.com
Jonathan Brossard jbrossard@salesforce.com
The Applications of Deep Learning on Traffic Identification
The Applications of Deep Learning on Traffic Identification
By
Zhanyi Wang (wangzhanyi@360.cn)
ROPInjector: Using Return- Oriented Programming for Polymorphism and AV Evasion
ROPInjector: Using Return-Oriented Programming for Polymorphism and AV Evasion
by G. Poulios, C. Ntantogian, C. Xenakis
BYPASS CONTROL FLOW GUARD COMPREHENSIVELY
BYPASS CONTROL FLOW GUARD COMPREHENSIVELY
by Zhang Yunhai
Subscribe to:
Posts (Atom)