Home
Contact us
Links
Disclaimer
Social Profiles
Popular Posts
WAF bypass Using Sql Injection
Video Demonstartion Hello Security Explorers , Welcome to Security Explored This is the next tutorial in Sql Injection Series. WAF Bypass...
Tor 0.2.2.34 Released with fixes of anonymity vulnerability
Tor 0.2.2.34 fixes a critical anonymity vulnerability where an attacker can deanonymize Tor users. Everybody should upgrade. The attac...
Bypassing Antivirus with a Sharp Syringe
Bypassing antiviruses is not a big deal now a days, the point is how creative you can get to do that. So here is the technique document...
Basic Sql injection tutorial+Video Demonstration
Watch It on Vimeo Watch It on Youtube Hello Security Explorers, Welcome to Security Explored. Today I Am going to teach yo...
A little guide for linux distros
Hi Security Explorers, Linux is growing really fast now a days and i believe it is the future of OS. Anyway there is still a lot of Linu...
Thursday, October 27, 2011
Using QR Tags To Attack Smart Phones
8:28 PM
Whitepapers
No comments
Whitepaper called Using QR Tags to Attack Smart Phones (Attaging). It discusses the threatscape related to arbitrary scanning of these tags and using Metasploit to exploit them.
Authored by Augusto Pereyra
Download
Email This
BlogThis!
Share to X
Share to Facebook
Newer Post
Older Post
Home
0 comments:
Post a Comment
0 comments:
Post a Comment