Personal Information
Organization / Workplace
Seoul, Korea
Occupation
사원
About
IT Security Specialist, with a focus on the areas of penetration testing and exploit development.
Tags
security
jongwon
종원
hacking
penetration test
exploit
pt
metasploit
virus
copperdroid
bof
virustotal
anubis
bufferoverflow
dex2jar
dex
xss
sql
webhacking
lfi
sql injection
rfi
secure coding
ios
clutch
jailbreak
plist
vulnerability (computing)
privacy
class-dump-z
android
machine
apktool
apk
malaysia
See more
Presentations
(2)Documents
(2)Likes
(36)Django in Production
Hyun-woo Park
•
9 years ago
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
Rhydham Joshi
•
10 years ago
WEB Front-End 개발과정 살펴보기
지수 윤
•
10 years ago
i-VOC (Voice of the Customer Big Data Analytics Solution) 고객의소리 분석
Taejoon Yoo
•
10 years ago
ujava.org Deep Learning with Convolutional Neural Network
신동 강
•
10 years ago
Face Recognition with OpenCV and scikit-learn
Shiqiao Du
•
12 years ago
Neural Networks in the Wild: Handwriting Recognition
John Liu
•
10 years ago
Lean Impact–Lean Startup for Mission-driven Organizations by Leanne Pittsford - The Lean Startup Conference 12/9/14
Lean Startup Co.
•
10 years ago
Deview2014 Live Broadcasting 추천시스템 발표 자료
choi kyumin
•
10 years ago
Ndc2014 시즌 2 : 멀티쓰레드 프로그래밍이 왜 이리 힘드나요? (Lock-free에서 Transactional Memory까지)
내훈 정
•
11 years ago
C++ 코드 품질 관리 비법
선협 이
•
11 years ago
Pentesting iOS Applications
jasonhaddix
•
12 years ago
Antid0te 2.0 – ASLR in iOS
Seguridad Apple
•
14 years ago
Mobile Application Security
Ishan Girdhar
•
13 years ago
Introduction to Android Development and Security
Kelwin Yang
•
13 years ago
Beyond the OWASP Top 10
iphonepentest
•
13 years ago
Evaluating iOS Applications
iphonepentest
•
13 years ago
Perform fuzz on appplications web interface
IndicThreads
•
14 years ago
VoIPER: Smashing the VoIP stack while you sleep
guestad6e9e
•
16 years ago
Python for-unix-and-linux-system-administration
Victor Marcelino
•
12 years ago
Python for Penetration testers
Christian Martorella
•
12 years ago
BeStorm Introduction
Amit Shirolkar
•
15 years ago
nullcon 2011 - Reversing MicroSoft patches to reveal vulnerable code
n|u - The Open Security Community
•
14 years ago
nullcon 2011 - Automatic Program Analysis using Dynamic Binary Instrumentation
n|u - The Open Security Community
•
14 years ago
nullcon 2011 - Fuzzing with Complexities
n|u - The Open Security Community
•
14 years ago
nullcon 2010 - Intelligent debugging and in memory fuzzing
n|u - The Open Security Community
•
15 years ago
BlackHat EU 2012 - Zhenhua Liu - Breeding Sandworms: How To Fuzz Your Way Out of Adobe Reader's Sandbox
MindShare_kk
•
13 years ago
FIND ME IF YOU CAN – SMART FUZZING AND DISCOVERY
Shreeraj Shah
•
12 years ago
nullcon 2010 - Software Fuzzing with Wireplay
n|u - The Open Security Community
•
15 years ago
JSON Fuzzing: New approach to old problems
titanlambda
•
14 years ago
Personal Information
Organization / Workplace
Seoul, Korea
Occupation
사원
About
IT Security Specialist, with a focus on the areas of penetration testing and exploit development.
Tags
security
jongwon
종원
hacking
penetration test
exploit
pt
metasploit
virus
copperdroid
bof
virustotal
anubis
bufferoverflow
dex2jar
dex
xss
sql
webhacking
lfi
sql injection
rfi
secure coding
ios
clutch
jailbreak
plist
vulnerability (computing)
privacy
class-dump-z
android
machine
apktool
apk
malaysia
See more