Personal Information
Unternehmen/Arbeitsplatz
San Francisco Bay Area, California United States
Beruf
Senior Security Consultant
Branche
Technology / Software / Internet
Webseite
decal.sdf.org
Info
Latest research paper: "Tickling CGI Problems"
Latest conference talk: "IPv6 Addressing Polymorphs and What's on the DNS Horizon.."
Previous conference talk: "Uncloaking IP Addresses on IRC"
CanSecWest 2009 Panel: "Binary Clone Wars"
Tags
security
cryptography
blockwatch
anti-virus
merkle hash trees
tiger
callaway
derek
derek callaway
infosec
forward secrecy
key exchange
university of arizona
curve22519
elleptic-curve
diffie-hellman
non-repudiation
integrity
digital signatures
cryptopp
malware
metamorphic
nist
hashdeep
polymorphism
packers
binary analysis
admmutate
message digest
information assurance
signature
equations
synthetic
genome
polymerase
chain
oligonucleotide
pcr
reaction
dna
primer
nucleotide
computing
intelligence
amsat
winlink
signals
satellite
sigint
packet
sdr
amateur
radio
nanticoke
ham
club
rfc1459
rfc1413
rfc2628
rfc1918
ircv3
sasl
irc
privacy
addresses
ip
on
uncloaking
md5
all in the family
3.0
kentucky
louisville
derbycon
static analysis
technical writing
gray box
white box
black box
project
testing
whitepaper
cycle
software
life
udel
sdlc
design
university of delaware
sdl
test
english
httpd
apache
shane macaulay
security objectives corporation
rain forrest puppy
expect
phrack
lyris list manager
cgi.tcl
tclhttpd
web
tk
cgi
tcl
application
Mehr anzeigen
Präsentationen
(4)Dokumente
(4)Gefällt mir
(33)Check Your Privilege (Escalation)
Bishop Fox
•
Vor 5 Jahren
Ferris Bueller’s Guide to Abuse Domain Permutations
Bishop Fox
•
Vor 5 Jahren
Exploiting Deserialization Vulnerabilities in Java
CODE WHITE GmbH
•
Vor 8 Jahren
Operating Systems - A Primer
Saumil Shah
•
Vor 12 Jahren
All The Little Pieces
Andrei Zmievski
•
Vor 14 Jahren
The Good, the Bad, and the Ugly: What Happened to Unicode and PHP 6
Andrei Zmievski
•
Vor 13 Jahren
Andrei's Regex Clinic
Andrei Zmievski
•
Vor 13 Jahren
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
Soroush Dalili
•
Vor 5 Jahren
Cache Money Business
Mark Jaquith
•
Vor 9 Jahren
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
HackIT Ukraine
•
Vor 6 Jahren
Thotcon0x9 Presentation: Climb the infosec skill tree by revisiting past CVEs
Sandra Escandor-O'Keefe
•
Vor 5 Jahren
A Forgotten HTTP Invisibility Cloak
Soroush Dalili
•
Vor 6 Jahren
Waf bypassing Techniques
Avinash Thapa
•
Vor 7 Jahren
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
Abraham Aranguren
•
Vor 9 Jahren
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
•
Vor 8 Jahren
Rooting your internals - Exploiting Internal Network Vulns via the Browser Using BeEF Bind
Michele Orru
•
Vor 11 Jahren
Bot Trends 2017
David Pichsenmeister
•
Vor 7 Jahren
Bot Boom: What marketers need to know about chatbots now - Erin Bury - Tech Forum 2018
BookNet Canada
•
Vor 6 Jahren
Will your intranet be replaced with a (chat) bot?
Thomas Maeder
•
Vor 6 Jahren
React Native: How It Works
Blagoja Evkoski
•
Vor 6 Jahren
Cross-Platform App Development with Flutter, Xamarin, React Native
Korhan Bircan
•
Vor 6 Jahren
A tour of React Native
Tadeu Zagallo
•
Vor 7 Jahren
React native by example by Vadim Ruban
Lohika_Odessa_TechTalks
•
Vor 6 Jahren
Ruby on Rails Penetration Testing
3S Labs
•
Vor 9 Jahren
50 data principles for loosely coupled identity management v1 0
Ganesh Prasad
•
Vor 10 Jahren
X-XSS-Nightmare: 1; mode=attack XSS Attacks Exploiting XSS Filter
Masato Kinugawa
•
Vor 8 Jahren
Hacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Imperva
•
Vor 7 Jahren
In depth understanding network security
Thanawan Tuamyim
•
Vor 10 Jahren
Linux Security for Developers
Michael Boelen
•
Vor 8 Jahren
DNA Based Computing
Rohit Srivastava
•
Vor 9 Jahren
Personal Information
Unternehmen/Arbeitsplatz
San Francisco Bay Area, California United States
Beruf
Senior Security Consultant
Branche
Technology / Software / Internet
Webseite
decal.sdf.org
Info
Latest research paper: "Tickling CGI Problems"
Latest conference talk: "IPv6 Addressing Polymorphs and What's on the DNS Horizon.."
Previous conference talk: "Uncloaking IP Addresses on IRC"
CanSecWest 2009 Panel: "Binary Clone Wars"
Tags
security
cryptography
blockwatch
anti-virus
merkle hash trees
tiger
callaway
derek
derek callaway
infosec
forward secrecy
key exchange
university of arizona
curve22519
elleptic-curve
diffie-hellman
non-repudiation
integrity
digital signatures
cryptopp
malware
metamorphic
nist
hashdeep
polymorphism
packers
binary analysis
admmutate
message digest
information assurance
signature
equations
synthetic
genome
polymerase
chain
oligonucleotide
pcr
reaction
dna
primer
nucleotide
computing
intelligence
amsat
winlink
signals
satellite
sigint
packet
sdr
amateur
radio
nanticoke
ham
club
rfc1459
rfc1413
rfc2628
rfc1918
ircv3
sasl
irc
privacy
addresses
ip
on
uncloaking
md5
all in the family
3.0
kentucky
louisville
derbycon
static analysis
technical writing
gray box
white box
black box
project
testing
whitepaper
cycle
software
life
udel
sdlc
design
university of delaware
sdl
test
english
httpd
apache
shane macaulay
security objectives corporation
rain forrest puppy
expect
phrack
lyris list manager
cgi.tcl
tclhttpd
web
tk
cgi
tcl
application
Mehr anzeigen