Doxing yourself through FOIA: understanding agency data structures to reverse engineer FOIA requests.
Hands-on Cryptography with Python
How to securely build your own IoT enabling embedded systems: from design to execution and assessment
Mobile App Attack (1)
Mobile App Attack (2)
Mobile App Attack (3)
Mobile App Attack (4)
Pentesting Industrial Control Systems : Capture the Flag!