Skip to content
Home
Origins
Services
Application Security
Web Application Penetration Testing
API Penetration Testing
Mobile Application Penetration Testing
Source Code Reviews
Threat Modeling
Architecture Reviews
Infrastructure Security
Internal Network Penetration Testing
External Network Penetration Testing
Active Directory Security Assessments
Wireless Network Penetration Testing
Host Reviews
Firewall Configuration Reviews
Cloud Security
Cloud Configuration Reviews
Cloud Penetration Testing
Adversary Simulations
Red Teaming
Purple teaming
OSINT
Phishing Simulations
DevSecOps
Container Security
Kubernetes configuration reviews
Other
Managed Vulnerability Scanning
PCI DSS Security Assessments
Hardware Security Assessments
Smart Contracts Security Assessments
MSOC
Academy
Advisory
Blog
Contact
Blog
Home
/ Blog
Domain Trusts: An Exploitation Playbook
Read More »
June 12, 2024
Car Hacking- The New Frontier In Cybersecurity
Read More »
June 10, 2024
Security Advisory – Multiple Vulnerabilities in Netgear WNR614 Router
Read More »
June 6, 2024
Cybersecurity Strategies For Small And Mid-Sized Businesses (SMBs)
Read More »
June 2, 2024
Using Win32 API with Rust: A Step-by-Step Guide
Read More »
May 31, 2024
Digisol DG-GR1321: Plaintext Password Storage Vulnerability (CVE-2024-4232)
Read More »
May 24, 2024
Digisol DG GR1321’s Improper Access Control CVE-2024-4231
Read More »
May 24, 2024
Digisol DG-GR1321 Password Policy Bypass Vulnerability (CVE-2024-2257)
Read More »
May 22, 2024
Asus RT-N12+ B1’s Credentials Stored in Cleartext – CVE‐2024‐28325
Read More »
May 15, 2024
Understanding Active Directory Certificate Services (AD CS)
Read More »
May 10, 2024
Asus RT N12 + B1’s CSV Injection CVE-2024-28328
Read More »
May 7, 2024
Tenda N300 F3 Router Password Policy Bypass Vulnerability
Read More »
April 22, 2024
X
Learn how real hackers compromise Windows systems.
Unlock the Windows Red Team Workshop
Enter your email to get access.
Hands-on • Limited seats • No spam