Blog
Home / Blog

The Scariest Gmail Hack Yet: Why Google Is Sounding The Alarm
The Scariest Gmail Hack Yet: Why Google Is Sounding The Alarm Atharva Nanche Every few years, a new cyber threat emerges that changes the way

Downgrade Frida Version on iOS Devices
Downgrade Frida Version on iOS Devices iOS Atharva Nanche Description Downgrading Frida may be necessary due to compatibility issues with certain tools, such as Objection,

Installing Burp Suite’s CA as a System Certificate on Android
Android Atharva Nanche Want to intercept all HTTPS traffic from Android apps — even those that block user-installed certificates? This guide walks you through installing

Task Hijacking StrandHogg (Pt. 2)
Welcome back to our Android Task Hijacking series! If you haven’t already read Part 1, we strongly recommend you start there to understand the foundational

Task Hijacking StrandHogg (Pt. 1)
StrandHogg is a critical Android vulnerability that exploits the OS’s multitasking system. It allows malicious applications to hijack legitimate app tasks and present counterfeit screens,

ChatGPT for Pen Testing (Pt. 2)
In our previous blog we explored how ChatGPT can assist penetration testers by offering support across tool usage, code analysis, and vulnerability research. As the

Security Advisory: Multiple Vulnerabilities in Syrotech Router
Overview: Our security research has uncovered multiple high-risk vulnerabilities in the Syrotech SY-GPON-1110-WDONT router. These issues pose serious risks, including unauthorized access, data exposure, and

Cyber Security Training
Hackers Love Untrained Users — Don’t Be One In today’s fast-paced and digitally driven world, cybersecurity has taken center stage. With cyber threats becoming more

Introduction To Assembly Language
Assembly language programming is a fascinating discipline that allows developers to interact directly with a computer’s hardware. This guide introduces you to the fundamentals of

Asus RT N12 + B1’s Privilege Escalation CVE-2024-28326
A critical privilege escalation vulnerability (CVE-2024-28326) has been identified in the Asus RT-N12+ B1 router. The device exposes an unrestricted root terminal via its UART

A Guide to Server-Side Template Injection (SSTI)
Web applications often use template engines to dynamically generate web pages by combining static templates with runtime data. While template engines make development faster and

Getting Started with Hardware Hacking
Ever been curious about hardware hacking but didn’t know where to begin? You’re not alone. At first glance, hardware hacking and reverse engineering can feel