PinnedAndroid Pentesting Methodology (Pt. 1)Android Pentesting Methodology Part 1 in this blog, we’ll discuss Android architecture and the different layers of Android architecture.May 27, 2022A response icon1May 27, 2022A response icon1
PinnedAntivirus Evasion — Part 1An Antivirus, by definition, is a software program used to prevent, detect, and eliminate malware and viruses. AVs in general use…Mar 31, 2022Mar 31, 2022
PinnedPublished inInfoSec Write-upsHacking GraphQL — Part 1In part 1 of the Hacking GraphQL series, we’re going to discuss the basics of GraphQL and how adversaries can exploit this service.Mar 25, 2022Mar 25, 2022
Executive Briefing: 16 Billion Passwords Leaked — Act Now or Risk Business CompromiseIn one of the most staggering breaches of digital trust in modern history, over 16 billion unique credentials have been exposed through a…18h ago18h ago
Cyber Security TrainingIn today’s rapidly evolving digital landscape, cybersecurity has become more important than ever. As cyber threats increase, organizations…2d ago2d ago
Security Advisory: Multiple Vulnerabilities in Netgear WNR614 RouterOverview:Jun 18, 2024Jun 18, 2024
Published inInfoSec Write-upsAzure Privilege Escalation Via Service PrincipalIn this blog, we will look at a variation of a real-world attack path to escalate our privileges from a compromised Application…Apr 24, 2023Apr 24, 2023
Published inInfoSec Write-upsDocker Hardening Best PracticesDocker has gained immense popularity in recent times due to its containerization capabilities. However, as with any widely used platform…Apr 7, 2023Apr 7, 2023
Published inInfoSec Write-upsBuffer Overflow BasicsBuffer overflow is a vulnerability where a program tries to store more data in a buffer than it can hold, potentially overwriting important…Apr 6, 2023Apr 6, 2023