Emerging Trends in Cybersecurity by Amar Prusty

il y a 5 ans 590 Vues

Closer look at PHP Unserialization by Ashwin Shenoi

il y a 5 ans 4244 Vues

Unicorn: The Ultimate CPU Emulator by Akshay Ajayan

il y a 6 ans 1389 Vues

The Art of Executing JavaScript by Akhil Mahendra

il y a 6 ans 664 Vues

DeViL - Detect Virtual Machine in Linux by Sreelakshmi

il y a 6 ans 588 Vues

Analysis of android apk using adhrit by Abhishek J.M

il y a 6 ans 779 Vues

S2 e (selective symbolic execution) -shivkrishna a

il y a 6 ans 527 Vues

Dynamic binary analysis using angr siddharth muralee

il y a 6 ans 724 Vues

Bit flipping attack on aes cbc - ashutosh ahelleya

il y a 6 ans 2436 Vues

Security Analytics using ELK stack

il y a 7 ans 1347 Vues

Linux Malware Analysis

il y a 7 ans 2642 Vues

Introduction to Binary Exploitation

il y a 7 ans 1197 Vues

ATM Malware: Understanding the threat

il y a 7 ans 3060 Vues