SECURITY RESOURCES
Offensive minded security exploit development
VerSprite Security Resources, Videos
Secure Development of Payment Applications

Slides & Presentations, VerSprite Security Resources
Understanding Data Privacy in a Digital Age

VerSprite Security Resources, Videos
Deep Dive into the Dalvik Virtual Machine’s JIT Implementation

Slides & Presentations, VerSprite Security Resources
Going Back in Time to Abuse Android’s JIT

Slides & Presentations, VerSprite Security Resources
Oh the POSsibilities – BSides ATL 2018

Security Research
Frida Engage Part Three | You Down With XPC?

Security Research
Oh the POSsibilities – Point-Of-Sale Insecurity

Security Research
XML EXTERNAL ENTITY (XXE) Processing

Regulatory Compliance
HIPAA with the Security Experts

Slides & Presentations, VerSprite Security Resources
XXE – OWASP

Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance
Cyber Criminals Target Employees with W-2 Phishing Scam

Security Research
Exploiting VyprVPN for MacOS
![[Video] Abusing Insecure WCF Endpoints](https://versprite.com/wp-content/uploads/2018/09/insecure-windows-communication-1024x576.png)
VerSprite Security Resources, Videos
[Video] Abusing Insecure WCF Endpoints

Application Security, Mobile Security Testing, Security Research
Exploiting the Dolphin Browser for Android’s Backup & Restore Feature

Application Security, Mobile Security Testing, Security Research
Shellcoding an Arm64 In-Memory Reverse TCP Shell with Frida

Subscribe for Our
Updates
Please enter your email address and receive the latest updates