1 |
 |
Nullcon Delhi 2012: Securing Software Ventures - By Aiden Riley Eller |
10 years, 5 months |
null0x00 |
nullcon, null, nullcon.net, null.co.in, Securing Software Ventures, Aiden Railey, nullcon Delhi, nullcon Delhi 2012 |
4906 |
None |
2 |
 |
Nullcon Delhi 2012: Opening The Kimono: Automating Behavioral Analysis For Mobile Apps - By Michael &Amp; Pradeep |
10 years, 5 months |
null0x00 |
Zscalar, Opening, the, Kimo, Opening the Kimo, nullcon, null, nullcon Delhi, nullcon.net, null.co.in, Mobile apps behavioral analysis, Mobile apps security |
4808 |
None |
3 |
 |
Nullcon Delhi 2012: Opening The Kimono: The Art Of Passive Web Vulnerability Analysis With Ironwasp - By Lavakumar |
10 years, 5 months |
null0x00 |
Ironwasp, Lavakumar, Lava Kumar, nullcon, null, nullcon.net, null.co.in, Passive Web Vulnerability Analysis, Web Vulnerability, Static Web Vulnerability Analysis, nullcon Delhi |
4749 |
None |
4 |
 |
Nullcon Delhi 2012: Reverse Engineering Of Fraudster Brain - By Neyolov Evgeny |
10 years, 4 months |
null0x00 |
nullcon, null, nulllcon.net, null.co.in, nullcon Delhi, Reverse engineering of fraudster brain, Casino Fraud, Online Casino vulnerability, online Poker vulnerability, online betting, e-payment system vulnerability, Forensic analysis of online casino server |
4722 |
2 |