Rahul
Analysis of Adversarial Code: The Role of Malware Kits!
Rahul - Analysis of Adversarial Code.pdf |
Sunil
Backdoor 2.0: Hacking one's Firefox to steal his web secrets.
Sunil
- Hacking firefox.ppt |
Chetan
Mining Digital Evidence in Microsoft Windows – Answering
Who, When, Why and How
Chetan - Mining Digital Evidence in Microsoft Windows.ppt |
Amish
&
Umesh
The future of automated web application testing
Amish Umesh - Future Of WebApp Testing.pdf |
Rohas
7 years of Indian IT act - 7 Best Cases
Rohas - 7 years of indian cyber laws.ppt
WHITEPAPER - 7 years of Indian Cyber Law.pdf |
David
Faster PwninG Assured: Cracking Crypto with FPGAs
David - FPGA.pdf |
|
Dror
Crazy Toaster: Can Home Devices turn against us?
Dror - Crazy toaster.ppt |
Ajit
Legiment Techniques of IPS/IDS Evasion
Ajit - LegimentTechniques.pdf |
Varun
Subtle Security flaws: Why you must follow the basic
principles of software security
Varun - Subtle Security flaws.ppt |
Shreeraj
Hacking Web 2.0 Art and Science of Vulnerability Detection
Shreeraj - Hacking Web 2.0.pdf |
Gaurav
Vulnerabilities in VoIP Products and Services
Gaurav-VoIP.pdf |
Tags for online image / video / news & blogs
clubhack & clubhack2007 |
|
|
|
|
|