Title |
Conference |
Tags |
The Perimeter Has Been Shattered: Attacking and Defending Mobility and IoT on the Enterprise Network |
NDCSecurity-2020 - Copenhagen, Denmark |
|
The Perimeter Has Been Shattered: Attacking and Defending Mobility and IoT on the Enterprise Network |
OWASPNewZealandDay-2020 - Auckland, New Zealand |
|
Bypassing iOS Security using Enterprise Provisioning Hooks and Enterprise Mobility Management |
ThreatCon-2019 - Kathmandu, Nepal |
|
Hacking Entrepreneurship: Lessons From Security Startup Founder |
SourceBoston-2018 - Boston, USA |
|
Keynote |
lascon-2017 - texas,usa |
|
Bypassing iOS Security using Enterprise Provisioning Hooks? |
hackerhalted-2017 - atlanta,usa |
|
Nine years into mobility, has security caught up |
saintcon-2016 - utah,usa |
|
Bypassing Security Controls With Mobile Devices |
DeepSec-2013 - Vienna,Austria |
|
Burning the Enterprise with BYOD |
DerbyCon-2013 - Louisville,Kentucky |
|
Burning the Enterprise with BYOD |
GrrCon-2013 - Michigan,USA |
|
Can You Hear Me Now: Leveraging Mobile Devices on Pentests |
Confidence-2013 - Krakow,Poland |
Security
|
Can You Hear Me Now? Leveraging Mobile Devices on Pentests |
HackMiami-2013 - Miami,USA |
Security
|
Can you hear me now? Leveraging Mobile Devices on Penetration Tests |
Hackcon-2013 - Oslo, Norway |
Security
|
ASSESSING BYOD WITH THE SMARTPHONE PENTEST FRAMEWORK |
BlackHat EU-2013 - Amsterdam, Netherlands |
Security
|
Smartphone Insecurity |
BSidesPHX-2013 - Arizona,USA |
Security
|
INTRODUCING THE SMARTPHONE PENTEST FRAMEWORK |
Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE |
Android
Mobile Security
Tools
|
Introducing the Smartphone Pentesting Framework |
Deepsec-2012 - Vienna, Austria |
Security
|
Penetration Testing with Metasploit |
Deepsec-2012 - Vienna, Austria |
Security
|
Keynote Speaker:Smartphone Pentest Framework |
BSidesJackson-2012 - Jackson,USA |
Security
|
Metasploit for Beginners Workshop |
BSidesJackson-2012 - Jackson,USA |
Security
|
Introducing the Smartphone Penetration Testing Framework |
BruCON-2012 - Ghent, Belgium |
Security
|
Transparent Botnet Command and Control for Smartphones over SMS |
Security B-Sides Las Vegas-2011 - Las Vegas, USA |
Security
|
Introducing the Smartphone Penetration Testing Framework [Breaking Ground Overflow] |
BSidesLasVegas-2012 - Las Vegas,USA |
|
Metasploit |
BSidesLasVegas-2012 - Las Vegas,USA |
|
SMARTPHONE PENTESTING FRAMEWORK |
BlackHat USA-2012 - Las Vegas, USA |
Security
|
The Smartphone Penetration Testing Framework |
HOPE-9 - New York |
Security
|
Bypassing the Android Permission Model |
Hack In Paris-2012 - Paris, France |
Security
|
Transparent Command and Control for Smartphones over SMS Redux |
Security B-Sides CT-2012 - Meriden, CT, USA |
Security
|
bypassing the android permission model |
HITB-2012 - Amsterdam,Netherkands |
|
Bypassing the Android Permission Model (E) |
Rocky Mountain Information Security Conference-2012 - Denver, USA |
Security
|
Bypassing Android Permissions |
CarolinaCon-8 - Raleigh, USA |
Security
|
Bypassing the Android Permission Model |
Thotcon-2012 - Chicago, USA |
Security
|
Metasploit for penetration testing |
Security B-Sides San Francisco-2012 - San Francisco, USA |
Security
|
Smartphone Insecurity |
Security B-Sides Phoenix-2012 - Phoenix, USA |
Security
|
Class Name: Metasploit for Penetration Testing |
Security B-Sides Delaware-2011 - Delaware, USA |
Security
|
Transparent Smartphone Spying No Apps Required |
Security B-Sides Delaware-2011 - Delaware, USA |
Security
|
transparent smartphone spying |
HackerHalted-2011 - Atlanta,USA |
|
Transparent Botnet Control For Smartphones Over Sms |
ShmooCon-2011 - Washington DC, USA |
Security
|