Personal Information
Organization / Workplace
San Francisco Bay Area, California United States
Occupation
Senior Security Consultant
Industry
Technology / Software / Internet
Website
decal.sdf.org
About
Latest research paper: "Tickling CGI Problems"
Latest conference talk: "IPv6 Addressing Polymorphs and What's on the DNS Horizon.."
Previous conference talk: "Uncloaking IP Addresses on IRC"
CanSecWest 2009 Panel: "Binary Clone Wars"
Tags
security
callaway
merkle hash trees
derek callaway
anti-virus
blockwatch
tiger
cryptography
derek
static analysis
technical writing
gray box
white box
black box
project
testing
whitepaper
cycle
software
derbycon
louisville
kentucky
3.0
all in the family
md5
uncloaking
on
ip
addresses
privacy
irc
sasl
application
tcl
cgi
tk
web
tclhttpd
cgi.tcl
lyris list manager
phrack
expect
rain forrest puppy
security objectives corporation
shane macaulay
apache
httpd
english
test
sdl
university of delaware
design
sdlc
udel
life
ircv3
polymerase
genome
synthetic
equations
signature
information assurance
message digest
admmutate
binary analysis
packers
polymorphism
hashdeep
nist
metamorphic
malware
cryptopp
digital signatures
integrity
non-repudiation
diffie-hellman
elleptic-curve
curve22519
university of arizona
key exchange
forward secrecy
rfc1918
rfc2628
rfc1413
rfc1459
club
ham
nanticoke
radio
amateur
sdr
packet
sigint
satellite
signals
winlink
amsat
intelligence
computing
nucleotide
primer
dna
reaction
pcr
oligonucleotide
chain
infosec
See more
Presentations
(4)Documents
(4)Likes
(33)Check Your Privilege (Escalation)
Bishop Fox
•
6 years ago
Ferris Bueller’s Guide to Abuse Domain Permutations
Bishop Fox
•
6 years ago
Exploiting Deserialization Vulnerabilities in Java
CODE WHITE GmbH
•
9 years ago
Operating Systems - A Primer
Saumil Shah
•
14 years ago
All The Little Pieces
Andrei Zmievski
•
16 years ago
The Good, the Bad, and the Ugly: What Happened to Unicode and PHP 6
Andrei Zmievski
•
14 years ago
Andrei's Regex Clinic
Andrei Zmievski
•
15 years ago
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
Soroush Dalili
•
7 years ago
Cache Money Business
Mark Jaquith
•
10 years ago
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
HackIT Ukraine
•
7 years ago
Thotcon0x9 Presentation: Climb the infosec skill tree by revisiting past CVEs
Sandra Escandor-O'Keefe
•
7 years ago
A Forgotten HTTP Invisibility Cloak
Soroush Dalili
•
8 years ago
Waf bypassing Techniques
Avinash Thapa
•
9 years ago
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
Abraham Aranguren
•
11 years ago
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
•
9 years ago
Rooting your internals - Exploiting Internal Network Vulns via the Browser Using BeEF Bind
Michele Orru
•
12 years ago
Bot Trends 2017
David Pichsenmeister
•
8 years ago
Bot Boom: What marketers need to know about chatbots now - Erin Bury - Tech Forum 2018
BookNet Canada
•
7 years ago
Will your intranet be replaced with a (chat) bot?
Thomas Maeder
•
7 years ago
React Native: How It Works
Blagoja Evkoski
•
7 years ago
Cross-Platform App Development with Flutter, Xamarin, React Native
Korhan Bircan
•
8 years ago
A tour of React Native
Tadeu Zagallo
•
9 years ago
React native by example by Vadim Ruban
Lohika_Odessa_TechTalks
•
7 years ago
Ruby on Rails Penetration Testing
3S Labs
•
11 years ago
50 data principles for loosely coupled identity management v1 0
Ganesh Prasad
•
12 years ago
X-XSS-Nightmare: 1; mode=attack XSS Attacks Exploiting XSS Filter
Masato Kinugawa
•
9 years ago
Hacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Imperva
•
8 years ago
In depth understanding network security
Thanawan Tuamyim
•
12 years ago
Linux Security for Developers
Michael Boelen
•
9 years ago
DNA Based Computing
Rohit Srivastava
•
11 years ago
Personal Information
Organization / Workplace
San Francisco Bay Area, California United States
Occupation
Senior Security Consultant
Industry
Technology / Software / Internet
Website
decal.sdf.org
About
Latest research paper: "Tickling CGI Problems"
Latest conference talk: "IPv6 Addressing Polymorphs and What's on the DNS Horizon.."
Previous conference talk: "Uncloaking IP Addresses on IRC"
CanSecWest 2009 Panel: "Binary Clone Wars"
Tags
security
callaway
merkle hash trees
derek callaway
anti-virus
blockwatch
tiger
cryptography
derek
static analysis
technical writing
gray box
white box
black box
project
testing
whitepaper
cycle
software
derbycon
louisville
kentucky
3.0
all in the family
md5
uncloaking
on
ip
addresses
privacy
irc
sasl
application
tcl
cgi
tk
web
tclhttpd
cgi.tcl
lyris list manager
phrack
expect
rain forrest puppy
security objectives corporation
shane macaulay
apache
httpd
english
test
sdl
university of delaware
design
sdlc
udel
life
ircv3
polymerase
genome
synthetic
equations
signature
information assurance
message digest
admmutate
binary analysis
packers
polymorphism
hashdeep
nist
metamorphic
malware
cryptopp
digital signatures
integrity
non-repudiation
diffie-hellman
elleptic-curve
curve22519
university of arizona
key exchange
forward secrecy
rfc1918
rfc2628
rfc1413
rfc1459
club
ham
nanticoke
radio
amateur
sdr
packet
sigint
satellite
signals
winlink
amsat
intelligence
computing
nucleotide
primer
dna
reaction
pcr
oligonucleotide
chain
infosec
See more