SECURITY RESOURCES
Offensive minded security exploit development
Application Security, Security Research
Into the Jar | JSON Pickle Exploitation

Application Security, Information Security Management System (ISMS)
Assessing Emerging JavaScript Platforms with Express.js and Node.js – What to Look For

Application Security, Mobile Security Testing, Security Research
Android Titan SMS Trojan Analysis | Part One

Governance Risk & Compliance, Information Security Management System (ISMS)
Security Metrics Rehab – Part One

Application Security, Mobile Security Testing, Security Research
Multiple Vulnerabilities in Mercury Browser for Android Version 2.2.2 & 3.0.0

Application Security, Mobile Security Testing, Security Research
Android InfoStealer – Godwon – Analysis

Application Security, Mobile Security Testing, Security Research
Android Emulator Detection

Application Security, Mobile Security Testing, Security Research
Baidu Browser for Android Insecurely Handles the Intent Url Scheme

Slides & Presentations, VerSprite Security Resources
PASTA Threat Modeling – One Day Training

Threat & Vulnerability Management
The Truth About Chinese Hardware Implants

Slides & Presentations, Threat Modeling, VerSprite Security Resources
Addressing Cybercrime via PASTA Threat Modeling

Application Security, Mobile Security Testing, Security Research
iOS Reverse Engineering: Part Two – Debugging and Tracing with LLDB

Application Security, Mobile Security Testing, Security Research
iOS Reverse Engineering: Part One – Configuring LLDB

Application Security, Security Research
Experiments with JSON-IO, Serialization, Mass Assignment, and General Java Object Wizardry

Application Security, Security Research
Quick and Dirty Web Services Testing with Suds and Burp Suite

Subscribe for Our
Updates
Please enter your email address and receive the latest updates