Blog
Home / Blog
- Active Directory
- Android
- API
- AWS
- Azure
- Blog
- Cloud
- Container Security
- Desktop Apps
- Hardware
- ICS
- Informational
- Infrastructure
- iOS
- IoT
- Kubernetes
- Linux
- OSINT
- PCI DSS
- Purple Team
- Red Team
- Reverse Engineering
- Smart Contracts
- Software Supply Chain
- Web Application
- Wireless Network
- Managed SOC
- Managed SOC
- Managed SOC
- VIDEOS
- Blog
- Videos
- Hardware Security Assessments
- Kubernetes configuration reviews
- Threat Modeling
- OSINT
- External Network Penetration Testing
- Cloud Penetration Testing
- Smart Contracts Security Assessments
- Wireless Network Penetration Testing
- Firewall Configuration Reviews
- Phishing Simulations
- Host Reviews

SSL Pinning Bypass for Android using Frida
/*! elementor – v3.23.0 – 05-08-2024 */ .elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=”.svg”]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block} /*! elementor – v3.23.0 – 05-08-2024 */ .elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading

Misconfigured Amazon S3 Buckets
What is Amazon S3? Excerpt from AWS documentation: Amazon Simple Storage Service (Amazon S3) is an object storage service offering industry-leading scalability, data availability, security,

NGINX Zero-Day Vulnerability 1
What is NGINX ? NGNIX is an open-source web server that can also act as a reverse proxy, load balancer, mail proxy, and HTTP cache.

Benefits of Penetration Testing
Synopsis Breaking into a company’s security defenses takes a long time and skill. However, modern techniques make it easier than ever for threat actors to

Wifi Hacking (Pt.1)
Wi-Fi stands for wireless network technology. It establishes wireless network connections using radio waves. Malicious hackers frequently opt to penetrate firms by compromising their Wi-Fi

Spring4Shell Vulnerability
Synopsis A sequence of Tweets (that are now deleted) from a Chinese Twitter account was posted on March 29th, 2022, displaying pictures of a new

Hacking GraphQL (Part 3)
In Part 2 of the Hacking GraphQL series, we discussed the GraphQL DoS attack. In Part 3, we’re going to try to exploit the SQLi

Server-Side Request Forgery
SSRF vulnerabilities allow an attacker to send crafted malicious requests from the back-end server of a vulnerable application. Criminals usually operate SSRF attacks to target

Antivirus Evasion (Part 2)
In Part 1 of our Antivirus Evasion series, we managed to get a meterpreter reverse shell while evading Windows Defender by writing an .exe file

Hacking GraphQL Part 2
In part 1 of the Hacking GraphQL series, we discussed about the basics of GraphQL. In part 2 of this series, we’re going to try

No SQL Injection
NoSQL Injection refers to cyber-attacks that inject malicious payloads into non-SQL databases like MongoDB. Due to the new demand for modern-day applications, there has been

Antivirus Evasion (Part 1)
Antivirus Evasion in general use signature-based and heuristics-based malware detection mechanisms. In this blog, we will learn and test some techniques to try and bypass