All Hot News Popular Media
Whitepaper File, PacketStorm Security

Tue, 24 Jul 2018 18:25:53 GMT
Machine Learning - Learning Cybersecurity
Whitepaper called Machine Learning - Learning Cybersecurity.

Mon, 23 Jul 2018 11:11:11 GMT
iSecCon 2018 Call For Papers
Intel Security Conference (iSecCon) 2018 has announced its call for papers. It will take place in Hillsboro, Oregon, USA from December 4th through the 5th, 2018.

Mon, 23 Jul 2018 03:33:33 GMT
File Upload Restrictions Bypass
Whitepaper called File Upload Restrictions Bypass.

Wed, 18 Jul 2018 23:23:33 GMT
Protecting Apps Against Jailbreaking And Rooting
Whitepaper called Protecting Apps Against Jailbreaking And Rooting. Written in Arabic.

Wed, 18 Jul 2018 11:11:11 GMT
AntiVirus Evasion With Metasploit's Web Delivery
Whitepaper called AntiVirus Evasion with Metasploit's Web Delivery - Leveraging PowerShell to Execute Arbitrary Shellcode.

Wed, 18 Jul 2018 11:02:22 GMT
VLAN Hopping Attack
Whitepaper called VLAN Hopping Attack.

Wed, 18 Jul 2018 10:11:11 GMT
Sony Playstation 4 5.05 BPF Double Free
Sony Playstation 4 version 5.05 BPF double-free kernel exploit whitepaper.

Wed, 11 Jul 2018 15:20:19 GMT
Abusing Kerberos: Kerberoasting
Whitepaper called Abusing Kerberos: Kerberoasting.

Thu, 28 Jun 2018 03:33:33 GMT
Rikki Don't Lose That Bluetooth Device
In this article, the authors want to present an example of exploiting a trust relationship between two technical devices that can put the confidentiality of sensitive data or the integrity of a computer system at risk. This trust relationship they exploit exists between two Bluetooth devices: On the one side a computer system you want to remain secure and you don't want to be compromised, for example your laptop, or your smartphone, and on the other side a Bluetooth device you usually do not consider worth protecting with special diligence as it simply is an output device of a specific kind and does not persistently store any of your valuable data locally, for example headphones.

Fri, 22 Jun 2018 15:53:12 GMT
UAC Bypass And Research With UAC-A-Mola
Whitepaper called UAC Bypass and Research with UAC-A-Mola. Written in Spanish.

Tue, 19 Jun 2018 03:33:33 GMT
Case Study: Security Of Modern Bluetooth Keyboards
This whitepaper is a case study that analyzes the security of modern bluetooth keyboards. In the course of this research project, SySS GmbH analyzed three currently popular wireless keyboards using Bluetooth technology that can be bought on the Amazon marketplace for security vulnerabilities. The following three devices were tested for security issues from different attacker perspectives: 1byoneKeyboard, LogitechK480, and MicrosoftDesignerBluetoothDesktop (Model1678 2017).

Thu, 14 Jun 2018 03:33:33 GMT
Database Security Threats And Injection Technique
Whitepaper called Database Security Threats and Injection Technique. Written in Persian.

Thu, 14 Jun 2018 02:22:22 GMT
EggHunter Buffer Overflow For Windows
Whitepaper called EggHunter Buffer Overflow for Windows. Written in Arabic.

Mon, 11 Jun 2018 04:44:44 GMT
Lateral Movement Using WinRM
Whitepaper called Lateral Movement using WinRM. Written in Arabic.

Fri, 01 Jun 2018 12:22:22 GMT
Reverse Engineering - Simple Patching
Whitepaper called Reverse Engineering - Simple Patching. Written in Arabic.

Fri, 01 Jun 2018 02:22:22 GMT
Android Application Pentest With Drozer
Whitepaper called Android Application Pentest With Drozer. Written in Persian.

Sat, 26 May 2018 10:11:11 GMT
SEH Buffer Overflow Basic Exploitation Tutorial
This is a SEH buffer overflow basic exploitation tutorial. Written in Arabic.

Wed, 23 May 2018 04:44:44 GMT
Deserialization Vulnerabilities
This whitepaper explains deserialization vulnerabilities in Java, Python, PHP, and Ruby.

Wed, 23 May 2018 01:11:11 GMT
Introduction To Wireless Network Penetration Testing
Whitepaper called Introduction to Wireless Network Penetration Testing. Written in Persian.

Thu, 10 May 2018 09:59:58 GMT
Code Review Steps And Methodologies
Whitepaper called Code Review Steps and Methodologies.

Wed, 09 May 2018 17:56:28 GMT
Web Forensics
Whitepaper called Web Forensics. Written in Vietnamese.

Sun, 06 May 2018 13:01:11 GMT
t2'18 Call For Papers
The t2'18 Call For Papers has been announced. It will take place October 25th through the 26th, 2018 in Helsinki, Finland.

Fri, 04 May 2018 01:14:13 GMT
Linux Restricted Shell Bypass Guide
Whitepaper titled Linux Restricted Shell Bypass Guide.

Fri, 27 Apr 2018 14:54:32 GMT
Windows Kernel Exploitation Tutorial Part 8: Use After Free
Whitepaper called Windows Kernel Exploitation Tutorial Part 8: Use After Free.

Hack In The Box GSEC 2018 Singpaore Call For Papers
Final call for the 2018 Hack In The Box (HITB) GSEC conference in Singapore. HITB GSEC is a 3-day deep knowledge security conference where attendees get to vote on the final agenda of talks and and to meet with the speakers they voted for.
view page: 223

Use the code SAVELED and get 10% off any LED bulb at


Start: 07 Aug 2017 | End: 07 May 2018

$1 OFF $10, $2 OFF $19, offer valid until 04/30/2018.


Start: 29 Oct 2017 | End: 30 Apr 2018

5% Off All Golf Shoes

Code: AW002

Start: 06 Jul 2017 | End: 06 Feb 2018

Search All Amazon* UK* DE* FR* JP* CA* CN* IT* ES* IN* BR* MX B.V. is based in Amsterdam in the Netherlands. Ready for some statistics? Our 1,534,024 properties, including 860,482 holiday rentals, are located in 123,105 destinations in 229 countries and territories, and are supported internationally by 198 offices in 70 countries.
2013 Copyright © Mobile version 2015 | PeterLife & company
Skimlinks helps publishers monetize editorial content through automated affiliate links for products. Affiliate programm.
Terms of use Link at is mandatory if site materials are using fully or particulary.
Were treated to the site administrator, a cup of coffee *