SECURITY RESOURCES
Offensive minded security exploit development
Slides & Presentations, VerSprite Security Resources
Oh the POSsibilities – BSides ATL 2018

Security Research
Frida Engage Part Three | You Down With XPC?

Security Research
Oh the POSsibilities – Point-Of-Sale Insecurity

Security Research
XML EXTERNAL ENTITY (XXE) Processing

Regulatory Compliance
HIPAA with the Security Experts

Slides & Presentations, VerSprite Security Resources
XXE – OWASP

Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance
Cyber Criminals Target Employees with W-2 Phishing Scam

Security Research
Exploiting VyprVPN for MacOS
![[Video] Abusing Insecure WCF Endpoints](https://versprite.com/wp-content/uploads/2018/09/insecure-windows-communication-1024x576.png)
VerSprite Security Resources, Videos
[Video] Abusing Insecure WCF Endpoints

Application Security, Mobile Security Testing, Security Research
Exploiting the Dolphin Browser for Android’s Backup & Restore Feature

Application Security, Mobile Security Testing, Security Research
Shellcoding an Arm64 In-Memory Reverse TCP Shell with Frida

VerSprite Security Resources, Videos
Fixing Threat Models with OWASP Efforts

Application Security, Governance Risk & Compliance
Swimming in the Deep End: Taking a Deeper Look at the Use Cases of JEA

Application Security, Mobile Security Testing, Security Research
Frida Engage Part One | Building an ELF Parser with Frida

VerSprite Security Resources, Webinars
Role of Zero Trust in Future Enterprise Security

Subscribe for Our
Updates
Please enter your email address and receive the latest updates