Skip to content
Home
Origins
Services
Application Security
Web Application Penetration Testing
API Penetration Testing
Mobile Application Penetration Testing
Source Code Reviews
Threat Modeling
Architecture Reviews
Infrastructure Security
Internal Network Penetration Testing
External Network Penetration Testing
Active Directory Security Assessments
Wireless Network Penetration Testing
Host Reviews
Firewall Configuration Reviews
Cloud Security
Cloud Configuration Reviews
Cloud Penetration Testing
Adversary Simulations
Red Teaming
Purple teaming
OSINT
Phishing Simulations
DevSecOps
Container Security
Kubernetes configuration reviews
Other
Managed Vulnerability Scanning
PCI DSS Security Assessments
Hardware Security Assessments
Smart Contracts Security Assessments
MSOC
Academy
Advisory
Blog
Contact
Blog
Home
/ Blog
Installing Burp Suite’s CA as a System Certificate on Android 11+
Read More »
February 23, 2026
Security Advisory – Multiple Vulnerabilities in Netgear WNR614 Router
Read More »
January 22, 2026
Downgrade Frida Version On iOS Devices
Read More »
August 11, 2025
Installing Burp Suite’s CA as a System Certificate on Android
Read More »
April 23, 2025
Task Hijacking StrandHogg (Pt. 2)
Read More »
January 2, 2025
Task Hijacking StrandHogg (Pt. 1)
Read More »
December 31, 2024
ChatGPT for Pen Testing (Pt. 2)
Read More »
August 9, 2024
Security Advisory: Multiple Vulnerabilities in Syrotech Router
Read More »
August 1, 2024
Hackers Love Untrained Users — Don’t Be One
Read More »
July 23, 2024
Introduction To Assembly Language
Read More »
July 23, 2024
Asus RT N12 + B1’s Privilege Escalation CVE-2024-28326
Read More »
July 23, 2024
A Guide to Server-Side Template Injection (SSTI)
Read More »
July 19, 2024
X
Learn how real hackers compromise Windows systems.
Unlock the Windows Red Team Workshop
Enter your email to get access.
Hands-on • Limited seats • No spam