×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
ajin-abraham documents
Education
Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss Army Knife
Technology
Abusing Google Apps and Data API: Google is My Command and Control Center
Education
Detecting and exploiting XSS with Xenotix XSS Exploit Framework
Education
Exploit Research and Development Megaprimer: Eliminating the Bad Characters in Shellcode
Education
Exploit Research and Development Megaprimer: DEP Bypassing with ROP Chains
Technology
Pwning with XSS: from alert() to reverse shell: Defcon Banglore 2013
Education
Exploit Research and Development Megaprimer: Unicode Based Exploit Development
Documents
Shellcoding in linux
Education
Exploit Research and Development Megaprimer: Win32 Egghunter
Technology
Abusing, Exploiting and Pwning with Firefox Add-ons
Internet
Abusing Exploiting and Pwning with Firefox Addons
Technology
Abusing, Exploiting and Pwning with Firefox Add-ons: OWASP Appsec 2013 Presentation
Education
Buffer overflow for Beginners
Documents
Xenotix XSS Exploit Framework: Clubhack 2012
Technology
OWASP Xenotix XSS Exploit Framework v3 : Nullcon Goa 2013
Education
Phishing With Data URI
Education
Wi-Fi Security with Wi-Fi P+
Mobile
Hacking Tizen: The OS of everything - Whitepaper
Technology
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Mobile
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile Security Framework
Mobile
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Next >