Thuyết phục bằng tâm lý

Vung Nguyen 11 years ago

Thick Application Penetration Testing: Crash Course

Scott Sutherland 11 years ago

Hunting for Credentials Dumping in Windows Environment

Teymur Kheirkhabarov 6 years ago

Creating Correlation Rules in AlienVault

AlienVault 11 years ago

Security Analyst Workshop - 20190314

Florian Roth 5 years ago

Red Team Methodology - A Naked Look

Jason Lang 4 years ago

Systems Performance: Enterprise and the Cloud

Brendan Gregg 10 years ago

Automated API pentesting using fuzzapi

Abhijeth D 7 years ago

Finding attacks with these 6 events

Michael Gough 8 years ago

Bypassing Windows Security Functions(en)

abend_cve_9999_0001 5 years ago

Secure Code Review 101

Narudom Roongsiriwong, CISSP 7 years ago

ShinoBOT Suite

Shota Shinogi 9 years ago

Detecting WMI Exploitation v1.1

Michael Gough 5 years ago

Hacking iOS Applications: A Detailed Testing Guide

Security Innovation 7 years ago

Cloud Design Patterns

Taswar Bhatti 6 years ago