cotalks.dev
Login
Security
Videos
1 — Life of a Pentester
2 — Security by Obscurity
3 — Centralized Logging Patterns
4 — Inside the Rise, Fall and Legacy of iOS Jailbreaking
5 — Tips to Reduce the Attack Surface When Using Third-Party Libraries
6 — How to Create Dark Buildings with Light Speed