Doxing yourself through FOIA: understanding agency data structures to reverse engineer FOIA requests.
Mobile App Attack (1)
Mobile App Attack (2)
How to securely build your own IoT enabling embedded systems: from design to execution and assessment
Mobile App Attack (3)
Pentesting Industrial Control Systems : Capture the Flag!
Hands-on Cryptography with Python
Mobile App Attack (4)