SECURITY RESOURCES
Offensive minded security exploit development
VerSprite Security Resources
Ekoparty 2018

Cybersecurity Library, Ebooks & Guides, VerSprite Security Resources
Evolving with Cybercriminals: How to Respond to Social Engineering Techniques

Geopolitical Risk, Possible Use Cases, VerSprite Security Resources
Improving Supply Chain of Medical Devices

Geopolitical Risk, Possible Use Cases, VerSprite Security Resources
Apparel Manufacturing Client Assessing M&A Target

VerSprite Security Resources
Messaging Security Breach

Red Teaming and Social Engineering, VerSprite Security Resources
Opening the Black Box of Payment Terminal Security

VerSprite Security Resources
Social Engineering Presentation

VerSprite Security Resources, Videos
Secure Development of Payment Applications

Slides & Presentations, VerSprite Security Resources
Understanding Data Privacy in a Digital Age

VerSprite Security Resources, Videos
Deep Dive into the Dalvik Virtual Machine’s JIT Implementation

Slides & Presentations, VerSprite Security Resources
Going Back in Time to Abuse Android’s JIT

Slides & Presentations, VerSprite Security Resources
Oh the POSsibilities – BSides ATL 2018

Slides & Presentations, VerSprite Security Resources
XXE – OWASP
![[Video] Abusing Insecure WCF Endpoints](https://versprite.com/wp-content/uploads/2018/09/insecure-windows-communication-1024x576.png)
VerSprite Security Resources, Videos
[Video] Abusing Insecure WCF Endpoints

VerSprite Security Resources, Videos
Fixing Threat Models with OWASP Efforts

Subscribe for Our
Updates
Please enter your email address and receive the latest updates