What is HTTP Cookies | 5 Methods to Exploit Cookies VulnerabilitiesHTTP cookies are small pieces of data that are stored on a user’s device by a web browser. They are used to store information about a…Apr 2, 2023Apr 2, 2023
How to Bypass IP RestrictionBypassing IP restriction can be done using various methods, including the use of Burp Suite, Curl, and Python. In this blog post, we will…Apr 1, 2023Apr 1, 2023
How To Manually Sign APK’s with keytool Jarsigner & ZipalignAs an Android developer, it’s important to know how to manually sign your APKs using keytool, jarsigner, and zipalign. This process is…Mar 28, 2023Mar 28, 2023
Active Directory Penetration Testing TutorialActive Directory Penetration Testing | Part 1Mar 24, 2023Mar 24, 2023
Android Pentesting Approach and ChecklistAs mobile devices have become an essential part of our lives, the security of these devices has become a top priority. Android is one of…Mar 24, 2023Mar 24, 2023
Active Directory (AD) exploitation involves identifying and exploiting vulnerabilities within an…1.Password attacksFeb 21, 2023Feb 21, 2023
Buffer overflow to RCEBuffer overflow to achieve remote code execution (RCE) is a serious security vulnerability in web applications. Attackers can exploit this…Feb 20, 2023Feb 20, 2023
No rate limitng over the tpOne-time passwords (OTP) are widely used for two-factor authentication (2FA) and are considered a secure way to protect user accounts…Feb 20, 2023Feb 20, 2023
AWS PentesPerforming penetration testing on Amazon Web Services (AWS) requires a strong understanding of the platform and its security features…Feb 20, 2023Feb 20, 2023