×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
mario-heiderich documents
Technology
JSMVCOMFG - To sternly look at JavaScript MVC and Templating Frameworks
Internet
In the DOM, no one will hear you scream
Technology
Scriptless Attacks - Stealing the Pie without touching the Sill
Education
The innerHTML Apocalypse
Technology
Locking the Throne Room - How ES5+ might change views on XSS and Client Side Security
Technology
Locking the Throneroom 2.0
Technology
Dev and Blind - Attacking the weakest Link in IT Security
Technology
HTML5 - The Good, the Bad, the Ugly
Technology
Web Wuermer
Technology
The Future of Web Attacks - CONFidence 2010
Technology
I thought you were my friend!
Business
Generic Attack Detection - ph-Neutral 0x7d8
Technology
The Ultimate IDS Smackdown
Technology
JavaScript From Hell - CONFidence 2.0 2009
Technology
The Image that called me - Active Content Injection with SVG Files
Internet
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes, and everything else
Internet
Copy & Pest - A case-study on the clipboard, blind trust and invisible cross-application XSS
Internet
An Abusive Relationship with AngularJS
Internet
Copy & Pest - A case-study on the clipboard, blind trust and invisible cross-application XSS
Internet
An Abusive Relationship with AngularJS
Internet
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes, and everything else
Next >