Search for "Lisa"

Don't scan, just ask
26 min

Don't scan, just ask

A new approach of identifying vulnerable web applications

A trip to India
62 min

A trip to India

Hunting down a criminal call center

OWASP Raider
47 min

OWASP Raider

a novel framework for manipulating HTTP processes of…

Post Memory Corruption Memory Analysis
62 min

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes