Blog
Home / Blog

Task Hijacking StrandHogg (Pt. 2)
Task Hijacking (StrandHogg) : Part 2 Jan 02, 2025 Android Application Vulnerabilites Atharva Nanche Hello, and welcome back! Hopefully you’ve already gone through Task Hijacking

Task Hijacking StrandHogg (Pt. 1)
Task Hijacking (StrandHogg), Part1 Dec 31, 2024 Android Atharva Nanche StrandHogg is an Android vulnerability in which malicious applications exploit its multitasking system to display

ChatGPT for Pen Testing (Pt. 2)
ChatGPT for Pen Testing (Pt. 2) August 09, 2024 AI Gaurav Choudhari In our previous blog, we discussed how ChatGPT could be vital in providing

Security Advisory: Multiple Vulnerabilities in Syrotech Router
Security Advisory: Multiple Vulnerabilities in Syrotech Router August 01, 2024 Hardware Gaurav Choudhari Overview: Our security analysis has uncovered multiple vulnerabilities in the Syrotech SY-GPON-1110-WDONT

Cyber Security Training
Cyber Security Training April 25, 2024 Informational Shashi Prasad In today’s rapidly evolving digital landscape, cybersecurity has become more important than ever. As cyber threats

Introduction to Assembly Language
Introduction to Assembly Language May 3, 2024 Hardware Gaurav Choudhari Assembly language programming is an intriguing field where programmers interact directly with the computer’s hardware.

Asus RT N12 + B1’s Privilege Escalation CVE-2024-28326
Asus RT N12 + B1’s Privilege Escalation CVE-2024-28326 May 09, 2024 Hardware Gaurav Choudhari Privilege escalation attacks are particularly dangerous as they allow attackers to

A Guide to Server-Side Template Injection (SSTI)
A Guide to Server-Side Template Injection (SSTI) January 01, 2023 Web Application Server-side template Injection (SSTI) occurs when an attacker injects a malicious payload into

Getting Started with Hardware Hacking
Getting Started with Hardware Hacking June 15, 2024 Hardware Shravan Singh Ever wanted to work on hardware hacking but didn’t know where to start? You’re

Using the Ch341A Programmer and ESP-01 Module to jazz up firmware!
Using the Ch341A Programmer and ESP-01 Module to jazz up firmware! June 15, 2024 Hardware Gaurav Choudhari Firmware customization is a crucial aspect of hardware

EXPLIoT: Framework for exploiting IoT products
EXPLIoT: Framework for exploiting IoT products June 14, 2024 Hardware Gaurav Choudhari Smart devices have quickly become a mainstay of our homes, offering convenience and

Flying Secure- A Comprehensive Guide to the Nabhyaan Drone
Flying Secure- A Comprehensive Guide to the Nabhyaan Drone June 14, 2024 Hardware Gaurav Choudhari Drones are rapidly becoming indispensable tools across various industries, from