SECURITY RESOURCES
Offensive minded security exploit development
Slides & Presentations, VerSprite Security Resources
PASTA Threat Modeling – One Day Training
Threat & Vulnerability Management
The Truth About Chinese Hardware Implants
Slides & Presentations, Threat Modeling, VerSprite Security Resources
Addressing Cybercrime via PASTA Threat Modeling
Application Security, Mobile Security Testing, Security Research
iOS Reverse Engineering: Part Two – Debugging and Tracing with LLDB
Application Security, Mobile Security Testing, Security Research
iOS Reverse Engineering: Part One – Configuring LLDB
Application Security, Security Research
Experiments with JSON-IO, Serialization, Mass Assignment, and General Java Object Wizardry
Application Security, Security Research
Quick and Dirty Web Services Testing with Suds and Burp Suite
Application Security, Mobile Security Testing, Risk Assessments
Unsafe Application State Restoration (iOS)
Slides & Presentations, VerSprite Security Resources
Application Security On A Dime
Application Security, Security Research
Exploiting XML Serialization in Python
Application Security, Data Privacy & Development of Security Policies
Force Feeding Enterprise Security Failures
VerSprite Security Resources, Videos
Error 500 | Exceptions That Will Get You Owned – BSidesATL 2013
Red Teaming and Social Engineering, VerSprite Security Resources
Contact VerSprite Penetration Testing
Slides & Presentations, Threat Modeling, VerSprite Security Resources, Web Application Security
Making Web Security PASTA – BSidesATL 2011
Integrated Risk Management (IRM)
How STIX Cyber Campaigns Provide Intel on Geopolitical and Cybersecurity Risks
Subscribe for Our
Updates
Please enter your email address and receive the latest updates