"Security Requirements Engineering", Oleksii Baranovskyi

il y a 6 ans 665 Vues

"How to make money with Hacken?", Dmytro Budorin

il y a 6 ans 785 Vues

"Using cryptolockers as a cyber weapon", Alexander Adamov

il y a 6 ans 477 Vues

"Bypassing two factor authentication", Shahmeer Amir

il y a 6 ans 1481 Vues

"Introduction to Bug Hunting", Yasser Ali

il y a 6 ans 608 Vues

"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy

il y a 6 ans 34615 Vues