Blog
Home / Blog
- Active Directory
- Android
- API
- AWS
- Azure
- Blog
- Cloud
- Container Security
- Desktop Apps
- Hardware
- ICS
- Informational
- Infrastructure
- iOS
- IoT
- Kubernetes
- Linux
- OSINT
- PCI DSS
- Purple Team
- Red Team
- Reverse Engineering
- Smart Contracts
- Software Supply Chain
- Web Application
- Wireless Network
- Managed SOC
- Managed SOC
- Managed SOC
- VIDEOS
- Blog
- Videos
- Hardware Security Assessments
- Kubernetes configuration reviews
- Threat Modeling
- OSINT
- External Network Penetration Testing
- Cloud Penetration Testing
- Smart Contracts Security Assessments
- Wireless Network Penetration Testing
- Firewall Configuration Reviews
- Phishing Simulations
- Host Reviews

Exploring Native Modules in Android with Frida
Mobile security testing is a crucial aspect of ensuring the integrity and security of Android applications. In order to thoroughly assess an app’s security, it’s

Understanding File Upload Vulnerabilities
In the digital world, the practice of uploading files is a fundamental functionality across numerous websites and applications. This article delves into the realm of

Terminal Multiplexing: Hijacking Tmux Sessions
Terminal sessions are a crucial part of any Linux system. Whether you’re an experienced system administrator or an aspiring Linux enthusiast, it’s crucial to understand

Preventing Exploitation of Deep Links
Deep links are a powerful tool for enhancing user experience in Android applications. They allow users to navigate directly to specific content within an app,

How to Exploit Android Activities?
This blog will explore different methods and techniques to exploit Android activities with the “exported=true” attribute set. By understanding the vulnerabilities associated with this attribute,

Exploiting Linux Capabilities: CAP_SYS_MODULE
In the intricate world of Linux, system administrators often encounter security exploits that capitalize on the Linux kernel’s vulnerabilities. One such vulnerability is the CAP_SYS_MODULE

Deciphering the Threat of Tabnabbing Attacks
In the vast, interconnected realm of the internet, security threats are as diverse and complex as the web itself. One such threat, often overlooked yet

Exploring the Latest iOS Pentesting Tools and Techniques
Due to our increasing dependence on mobile applications, ensuring their security has become more crucial. iOS devices continue to dominate the market; therefore, organizations must

Havoc C2 Framework
Havoc C2 has quickly become one of many peoples’ favorite open-source C2s. Its features offer everything you need to complete a pen test or red

Key Principles of a Zero-Trust Cybersecurity Framework
Cyber security has become critical to organizations worldwide as cyber threats grow increasingly sophisticated and widespread. Therefore, organizations must implement advanced measures of protection to

Exploiting Misconfigured Active Directory Certificate Template – ESC1
Certificates are crucial in establishing trust and securing communication within the Active Directory environment. They are used for authentication, encryption, and digital signatures. Certificate Templates

Understanding Intent Injection Vulnerabilities in Android Apps
In the complex world of Android app security, intent injection vulnerabilities pose a significant threat. These vulnerabilities allow attackers to manipulate the communication between different