1 |
|
Nullcon Delhi 2012: Securing Software Ventures - By Aiden Riley Eller |
11 years, 3 months |
null0x00 |
nullcon, null, nullcon.net, null.co.in, Securing Software Ventures, Aiden Railey, nullcon Delhi, nullcon Delhi 2012 |
5414 |
None |
2 |
|
Nullcon Delhi 2012: Opening The Kimono: Automating Behavioral Analysis For Mobile Apps - By Michael &Amp; Pradeep |
11 years, 3 months |
null0x00 |
Zscalar, Opening, the, Kimo, Opening the Kimo, nullcon, null, nullcon Delhi, nullcon.net, null.co.in, Mobile apps behavioral analysis, Mobile apps security |
5316 |
None |
3 |
|
Nullcon Delhi 2012: Opening The Kimono: The Art Of Passive Web Vulnerability Analysis With Ironwasp - By Lavakumar |
11 years, 3 months |
null0x00 |
Ironwasp, Lavakumar, Lava Kumar, nullcon, null, nullcon.net, null.co.in, Passive Web Vulnerability Analysis, Web Vulnerability, Static Web Vulnerability Analysis, nullcon Delhi |
5239 |
None |
4 |
|
Nullcon Delhi 2012: Reverse Engineering Of Fraudster Brain - By Neyolov Evgeny |
11 years, 3 months |
null0x00 |
nullcon, null, nulllcon.net, null.co.in, nullcon Delhi, Reverse engineering of fraudster brain, Casino Fraud, Online Casino vulnerability, online Poker vulnerability, online betting, e-payment system vulnerability, Forensic analysis of online casino server |
5237 |
4 |