File list

Jump to: navigation, search

This special page shows all uploaded files.

File list
Items per page:
Search for media name:
Username:

descDate Name Thumbnail Size User Description Versions
14:03, 28 April 2014OWASP IL 2008 01 Ofer Shezaf.jpg (file)222 KBOshezaf 2
00:57, 14 October 2013OWASP IL 2013 10 Oren Peleg Automatic trust based segregation for content providers.pdf (file)2.19 MBOshezaf 1
00:54, 14 October 2013OWASP IL 2013 10 Chilik Tamir GameOfPwns-Pwning iOS pentesting with iNalyzer.pdf (file)13.07 MBOshezaf 1
11:04, 7 October 2013OWASP IL 2013 10 Adi Sharabani Mobile Threats.pdf (file)4.8 MBOshezaf 1
07:31, 3 October 2013OWASP IL 2013 10 Irene Abezgauz Evolution of Application Security.pdf (file)1.27 MBOshezaf 1
15:21, 2 October 2013OWASP IL 2013 10 Shay Chen Invisible Purge.pdf (file)2.1 MBOshezaf 1
15:21, 2 October 2013OWASP IL 2013 10 Yaniv Simsolo Delivering Security in CD Environments.pdf (file)726 KBOshezaf 1
15:20, 2 October 2013OWASP IL 2013 10 OWASP Ron Moritz Why Are Investors Excited About Cyber Security Startups.pdf (file)454 KBOshezaf 1
15:20, 2 October 2013OWASP IL 2013 10 Avi Douglan Spam-DeathThreats-Abuse-OnlineCommunities.pdf (file)5.13 MBOshezaf 1
15:19, 2 October 2013OWASP IL 2013 10 Nir Valtman STDD.pdf (file)1.06 MBOshezaf 1
15:19, 2 October 2013OWASP IL 2013 10 Erez Metula The ReFrameworker Android runtime manipulator.pdf (file)1.61 MBOshezaf 1
15:18, 2 October 2013OWASP IL 2013 10 Chechik Davidi Utilizing Popular Websites for Malicious Purposes Using RDI.pdf (file)896 KBOshezaf 1
07:34, 1 June 2013OWASP IL 2013 05 Denial of Service - Made Easy.pdf (file)1.39 MBOshezaf 1
05:35, 1 June 2013OWASP IL 2013 05 Publishing Enterprise Web Applications to BYOD using a Granular Trust Model.pdf (file)1.93 MBOshezaf 1
16:29, 7 May 2013OWASP IL 2013 02 Renana Friedlich CrimeDoesPay.pdf (file)1.09 MBOshezaf 1
03:21, 14 February 2013OWASP IL 2013 02 Renana Friedlich CrimeDoesPay.pptx (file)3.34 MBOshezaf 1
03:12, 14 February 2013OWASP IL 2013 02 Itzik Kotler Pythonect for SP.pdf (file)191 KBOshezaf 1
02:52, 14 February 2013OWASO IL 2013 02 Renana Friedlich CrimeDoesPay.pptx (file)3.35 MBOshezaf 2
16:14, 24 January 2013OWASP IL EY MAP.png (file)448 KBOshezaf 1
23:44, 25 September 2011OWASPIL2011 Zalalichin Mobile Security.pdf (file)2.59 MBOshezaf 1
23:43, 25 September 2011OWSPIL2011 Tamir Tampering101.pdf (file)1.59 MBOshezaf 1
05:16, 25 September 2011Security testing for REST applications.pdf (file)755 KBOshezaf 1
18:07, 15 January 2010OWASP IL Ofer Shezaf - WAFs in the Clouds.pptx (file)4.68 MBOshezaf 2
15:56, 22 September 2009OWASP IL 2009 The Bank Job.ppt (file)695 KBOshezaf 1
01:25, 10 September 2009OWASP IL 2009 XSS detection.ppt (file)1.17 MBOshezaf 1
01:09, 10 September 2009OWASP IL 2009 IdM.ppt (file)1.18 MBOshezaf 1
01:07, 10 September 2009OWASP IL 2009 ReDoS.ppt (file)1.17 MBOshezaf 1
06:16, 9 September 2009OWASP IL 2009 SSSL.ppt (file)2.87 MBOshezaf 1
06:12, 9 September 2009OWASP IL 2009 ReDoS.pdf (file)351 KBOshezaf 1
09:36, 10 May 2009OWASP Israel - May 2009 - Ofer Shezaf - Automation Attacks.pdf (file)1.15 MBOshezaf 1
06:36, 10 May 2009OWASP IL - May 2009 - Ofer Shezaf - Automation Attacks.ppt (file)1.15 MBOshezaf 1
09:40, 13 April 2009OWASP Israel - March 2009 - Yaron Hakon - PCI key managment.pdf (file)1.95 MBOshezaf 1
08:20, 30 March 2009OWASP Israel - March 2009 - Or Katz - RFI detection.pdf (file)278 KBOshezaf 1
08:18, 30 March 2009OWASP Israel - March 2009 - Ofer Shezaf - Why WAFs fail.pdf (file)268 KBOshezaf 1
08:17, 30 March 2009OWASP Israel - March 2009 - Mikko Saario - Web Application Security in the Mobile World.pdf (file)689 KBOshezaf 1
08:17, 22 February 2009Norway chapter statutes.doc (file)40 KBOshezaf 1
09:04, 2 February 2009OWASP Israel 2009 01 Gregory Fresnais Measuring WAF Performance.pdf (file)4.52 MBOshezaf 1
08:54, 2 February 2009OWASP Israel 2009 01 Nimrod Luria Web 2.0 Security.pdf (file)1.55 MBOshezaf 1
10:41, 28 September 2008OWASP IL 2008 Ofer Maor Testing The Tester.ppt (file)545 KBOshezaf 1
10:40, 28 September 2008OWASP IL 2008 Maty Siman Security Code Analysis.ppt (file)517 KBOshezaf 1
05:55, 22 September 2008OWASP IL 2008 Sharabani BlackBox Vs WhiteBox.ppt (file)1.12 MBOshezaf 1
23:44, 17 September 20082008-09-14 OWASP Israel 2008.ppt (file)1.95 MBOshezaf 1
10:40, 16 September 2008OWASP IL 2008 David Movshovitz AJAX.ppt (file)2.75 MBOshezaf 1
07:08, 16 September 2008OWASP IL 2008 Ohad Ben Cohen Korset.pdf (file)2.6 MBOshezaf 1
01:59, 16 September 2008OWASP IL 2008 Alon Resen eVoting.pdf (file)6.56 MBOshezaf 1
01:36, 16 September 2008OWASP IL 2008 Amichai Shulman BeyondGoogleHackingn.ppt (file)2.83 MBOshezaf 1
09:07, 15 September 2008OWASP IL 2008 Ronen Bachar RIA.ppt (file)261 KBOshezaf 1
08:18, 15 September 2008OWASP IL 2008 Yuli Stremovsky.GreenSQL Database Firewall.ppt (file)442 KBOshezaf 1
08:15, 15 September 2008OWASP IL 2008 Yaniv Miron UTF7 XSS.ppt (file)6.08 MBOshezaf 1
23:22, 14 September 2008OWASP IL 2008 Amir Herzberg Defending against Phishing without Client-side Code.ppt (file)1.28 MBOshezaf 1

First page
First page
Last page
Last page