Prasad PathakSecure Coding DOJO | Buffer Overflow Vulnerability | Part 3Secure Coding Buffer Overflow VulnerabilityFeb 8Feb 8
Prasad PathakSecure Coding DOJO | Buffer Overflow Vulnerability | Part 2Incorrect Calculation of Buffer Sizes | Buffer Overflow Vulnerabilities | OWASP Top 10Feb 7Feb 7
Prasad PathakSecure Coding DOJO | Buffer Overflow Vulnerability | Part 1Secure Coding DOJO | Buffer Overflow Vulnerability | Part 1/3Feb 6Feb 6
Prasad PathakSecure Coding DOJO | Parameterized Statements | Part 2 | SQL InjectionOWASP’s Secure Coding DOJO for SQL Injection Security VulnerabilityFeb 6Feb 6
Prasad PathakSecure Coding DOJO | Parameterized Statements | Part 1 | Command InjectionOWASP’s Secure Coding DOJO for Command Injection Security VulnerabilityFeb 6Feb 6
Prasad PathakLEARN365: Day 1 | 2FA Bypass Techniques | Part 22FA Bypass Techniques, part 2(6 Techniques illustrated)Feb 5Feb 5
Prasad PathakLEARN365: Day 1 | 2FA Bypass Techniques | Part 12FA Bypass Techniques, part 1 (7 Techniques illustrated)Feb 5Feb 5
Prasad PathakSecure Coding DOJO | Input ValidationOWASP Secure Coding DOJO for Input ValidationFeb 3Feb 3