Bg

Resources

Blogs

Understanding Stealer Logs and Their Role in Security Testing: A Focus on Asset Discovery— Part 2
Understanding Stealer Logs and Their Role in Security Testing: A Focus on Asset Discovery— Part 2
Read More
Chain of Multiple Issues: From Misconfigured CloudFlare to Information Disclosure via Debug Mode, Revealing the Master OTP Code
Chain of Multiple Issues: From Misconfigured CloudFlare to Information Disclosure via Debug Mode, Revealing the Master OTP Code
Read More
Bypassing iOS App Jailbreak Detection by Patching the Binary with Ghidra: Write-up of No-Escape Lab from MobileHackingLab
Bypassing iOS App Jailbreak Detection by Patching the Binary with Ghidra: Write-up of No-Escape Lab from MobileHackingLab
Read More
The Strategic Role of GRC in Achieving Organizational Goals through Information Security
The Strategic Role of GRC in Achieving Organizational Goals through Information Security
Read More
Integrating IP Rotation with Burp Suite to Bypass IP-Based Blocking in Security Perimeters during Security Testing
Integrating IP Rotation with Burp Suite to Bypass IP-Based Blocking in Security Perimeters during Security Testing
Read More
Role of GPS Spoofing and GSM Hacking in Modern Era
Role of GPS Spoofing and GSM Hacking in Modern Era
Read More
Understanding Stealer Logs and Its Role in Security Testing — Part 1
Understanding Stealer Logs and Its Role in Security Testing — Part 1
Read More
A Deep Dive into Exploiting SaaS-Based Company Partnership Management Dashboards through a Chain of Vulnerabilities
A Deep Dive into Exploiting SaaS-Based Company Partnership Management Dashboards through a Chain of Vulnerabilities
Read More
"Electron-Based Security Testing Fundamentals."
"Electron-Based Security Testing Fundamentals."
Read More
Prevention of Car Door Hacking: Mechanical and Electronic Techniques
Prevention of Car Door Hacking: Mechanical and Electronic Techniques
Read More