Aggregator
Public Report – Filecoin Bellman and BLS Signatures Cryptographic Review
1 year 9 months ago
Public Report – Android Cloud Backup/Restore
1 year 9 months ago
Public Report – Coda Cryptographic Review
1 year 9 months ago
Public cloud
1 year 9 months ago
Proxy Re-Encryption Protocol: IronCore Public Report
1 year 9 months ago
PRTG Network Monitor Command injection
1 year 9 months ago
Protecting stored cardholder data (an unofficial supplement to PCI DSS V3.0)
1 year 9 months ago
ProxMon
1 year 9 months ago
ProxMon: Automating Web Application Penetration Testing
1 year 9 months ago
Project Triforce: Run AFL on Everything!
1 year 9 months ago
Properly Signed Certificates on CPE Devices
1 year 9 months ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 8: Development of Prototype #4 – Building on Takaesu’s Approach with Focus on XSS
1 year 9 months ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 9: Adventures with Expert Systems
1 year 9 months ago
Project Bishop: Clustering Web Pages
1 year 9 months ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 6: Development of Prototype #2 – Creating a SQLi PoC
1 year 9 months ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 7: Development of Prototype #3 – Adventures in Anomaly Detection
1 year 9 months ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 4: Architecture and Design
1 year 9 months ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 5: Development of Prototype #1 – Text Processing and Semantic Relationships
1 year 9 months ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 10: Efficacy Demonstration, Project Conclusion and Next Steps
1 year 9 months ago