Blog

Home / Blog

ssl pinning bypass

SSL Pinning Bypass for Android using Frida

/*! elementor – v3.23.0 – 05-08-2024 */ .elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=”.svg”]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block} /*! elementor – v3.23.0 – 05-08-2024 */ .elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading

Read More »
Misconfigured Amazon S3 Buckets

Misconfigured Amazon S3 Buckets

What is Amazon S3? Excerpt from AWS documentation: Amazon Simple Storage Service (Amazon S3) is an object storage service offering industry-leading scalability, data availability, security,

Read More »
Wifi Hacking (Pt.1)

Wifi Hacking (Pt.1)

Wi-Fi stands for wireless network technology. It establishes wireless network connections using radio waves. Malicious hackers frequently opt to penetrate firms by compromising their Wi-Fi

Read More »
Server-Side Request Forgery

Server-Side Request Forgery

SSRF vulnerabilities allow an attacker to send crafted malicious requests from the back-end server of a vulnerable application. Criminals usually operate SSRF attacks to target

Read More »
no sql injection

No SQL Injection

NoSQL Injection refers to cyber-attacks that inject malicious payloads into non-SQL databases like MongoDB. Due to the new demand for modern-day applications, there has been

Read More »
Antivirus Evasion (Part 1)

Antivirus Evasion (Part 1)

Antivirus Evasion in general use signature-based and heuristics-based malware detection mechanisms. In this blog, we will learn and test some techniques to try and bypass

Read More »