Skip to content
Home
Origins
Services
Application Security
Web Application Penetration Testing
API Penetration Testing
Mobile Application Penetration Testing
Source Code Reviews
Threat Modeling
Architecture Reviews
Infrastructure Security
Internal Network Penetration Testing
External Network Penetration Testing
Active Directory Security Assessments
Wireless Network Penetration Testing
Host Reviews
Firewall Configuration Reviews
Cloud Security
Cloud Configuration Reviews
Cloud Penetration Testing
Adversary Simulations
Red Teaming
Purple teaming
OSINT
Phishing Simulations
DevSecOps
Container Security
Kubernetes configuration reviews
Other
Managed Vulnerability Scanning
PCI DSS Security Assessments
Hardware Security Assessments
Smart Contracts Security Assessments
MSOC
Academy
Advisory
Blog
Contact
Blog
Home
/ Blog
Security Advisory – Multiple Vulnerabilities in Netgear WNR614 Router
Read More »
January 22, 2026
Downgrade Frida Version On iOS Devices
Read More »
August 11, 2025
Installing Burp Suite’s CA as a System Certificate on Android
Read More »
April 23, 2025
Task Hijacking StrandHogg (Pt. 2)
Read More »
January 2, 2025
Task Hijacking StrandHogg (Pt. 1)
Read More »
December 31, 2024
ChatGPT for Pen Testing (Pt. 2)
Read More »
August 9, 2024
Security Advisory: Multiple Vulnerabilities in Syrotech Router
Read More »
August 1, 2024
Asus RT N12 + B1’s Privilege Escalation CVE-2024-28326
Read More »
July 23, 2024
Getting Started with Hardware Hacking
Read More »
June 15, 2024
EXPLIoT: A Framework For Exploiting And Securing IoT Devices
Read More »
June 14, 2024
Flying Secure- A Comprehensive Guide to the Nabhyaan Drone
Read More »
June 14, 2024
Security Advisory – Multiple Vulnerabilities in LB-link BL-W1210M Router
Read More »
June 13, 2024
X
Learn how real hackers compromise Windows systems.
Unlock the Windows Red Team Workshop
Enter your email to get access.
Hands-on • Limited seats • No spam