[EXCLUSIVE PROGRAMS] [BUG BOUNTY LIST ] [HACKTIVITY] | |
Account [Researcher: 1093 Advisories: 900 Documents: 32 Videos: 178 Date: 29.08.2016 TZ: 05:35

[ Home ] [ Mobile ] [ Vendor ] [ Web-Application ] [ Remote ] [ Local ] [ Websites ] [ Documents ] [ Videos ] [ Search ] [ FAQ ]

Commercial Talks - Event Speakers, PenTest Shows or Workshops

Vulnerability-Lab provides stable commercial talks which are getting extended in a period of every quartal per year to make them unique and perfect. This talks are very informativ for researchers, security companies or penetration tester to learn about manually exploitation, protection, bypass technics, secure programming & more ...

Our company does not only offers workshops and presentations, it does as well live shows for hacking events and conferences. As in other subject areas, the emphasis here is on IT security. To get an overview on the various training courses, workshops and to give live shows, we have extra hacking compiled for you the following information. All our training courses, lectures and performances require no previous IT knowledge. Only if a workshop or a presentation with advanced or expert is instantly highlighted in the title, we require a technical knowledge for your understanding. The training courses and workshops take an average of 1-2 day (s) to complete and include short breaks. The live shows of Hacking take between 30-60 minutes and 60-120 minutes between our presentations, those are ideal for conferences or training sessions.


[ Workshops ]

We have excellent & exclusive workshops around topics like phone/mobile security, zero-day software & application bugs, firewall & filter pentests. Review and book one or two workshops for your industry, company, event or private team. Enjoy the advanced live workshops by our official vulnerabilityy laboratory experts.

240 MinutesBug Bounty Programs in 2016 - The Researcher Perspective ScoresKunz Mejri
240 MinutesiOS 6.x - v9.x - Advanced Exploitation & Zero Day VulnerabilitiesKunz Mejri
120 MinutesSnort as an IDS/IPS and exporting logs to ELKStack or SnorbyKaleem

[ Talks ]

Our Talks & Presentations impact well known security topics of further or already past research. Review and book one or two workshops for your industry, company, event or private team. Enjoy the advanced live workshops by our official vulnerabilityy laboratory experts.

120 MinutesBug Bounty Programs in 2016 - Requirements, Stability and SeriousnessKunz Mejri
120 MinutesDiscovering own Zero Day Vulnerabilities & Exploits in OSXJuan Sacco

[ Presentation ]

240 MinutesATM Security Vulnerabilities - Advanced Exploitation & Attack VectorsKunz Mejri
120 MinutesSkype Software Vulnerabilities - Advanced Exploitation 2011 - 2014Kunz Mejri
120 MinutesUTM, Filter & Web Firewalls - Advanced Exploitation & Bypass TechnicsKunz Mejri
120 MinutesVulnerability Management - Markets, Infrastructure & IntelligenceKunz Mejri
120 MinutesExploit Pack Framework - Advanced PenTesting & ExploitationJuan Sacco

Copyrights, Permission & Trademarks

All pictures, texts, advisories, sourcecodes, ressources, videos and other information of the vulnerability lab website is trademark of the evolution security gmbh company & the specific authors, manufacturer or manager team. To record, public list(feed/auto), modify, public demo usage, copy or edit our material contact the administrators or managers of the program to get a permission.

Vulnerability Laboratory - Vulnerability Research Program (EU)
www.vulnerability-lab.com or www.vuln-lab.com


[MAGAZINE] [CHAT] [August] 24 Critical: 0 High: 8 Medium: 16 Low: 0 Best Researcher: [ZwX] Threat:

© EVOLUTION SECURITY GmbH ™