⛷️
Thanks for visiting!
“Control yourself, not your dreams.”
— Dr. Stephen LaBerge
Pinned Loading
-
Android-Security-Exploits-YouTube-Curriculum
Android-Security-Exploits-YouTube-Curriculum Public🔓A curated list of modern Android exploitation conference talks.
-
BSIDES-Security-Las-Vegas-2024
BSIDES-Security-Las-Vegas-2024 PublicSlide Deck | CVE Hunting: Wi-Fi Routers, OSINT & ‘The Tyranny of the Default’
-
Shmoocon-2024
Shmoocon-2024 PublicSlide Deck | Inter-App Collusion: Exploiting the Improper Export of Android Application Components for Privilege Elevation & Credential Theft
-
BSIDES-Security-Rochester-2023
BSIDES-Security-Rochester-2023 PublicSlide Deck | Hardware Hacking: A Brief Primer on Reverse Engineering Bluetooth Transmissions
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.