Malicious File Detection: CDB Lists & Active Response
Introduction Detecting malicious files is super important for keeping your computer safe. If we don’t […]
Electron Shock: Unveiling Vulnerabilities and Pentesting Strategies
What is ElectronJs? The Electron is an open-source desktop application framework. You might be wondering […]
Smali Code Analysis for Android Hacking
Part 1 What is Smali Code? Smali is a low-level programming language used to create, […]
Wireless Warfare: Evil Twin vs Rogue Access Points
Ever connected to what you thought was a safe Wi-Fi network, only to realize it’s […]
Unmasking Clickjacking: Stay Informed, Stay Protected
“Hey there, internet explorers! Have you ever clicked on something online and ended up somewhere […]
Cracking the Code: When Encryption Fails to Secure
Introduction In the realm of web development, JavaScript stands as a cornerstone language, empowering dynamic […]
Threat Beyond The Front-end: SSRF
Welcome to our blog dedicated to exploring the intricate world of Server-Side Request Forgery (SSRF). […]
A Pentester’s Guide to Server Side Template Injection (SSTI)
Basics of SSTI Before diving into Server-Side Template Injection (SSTI), it’s important to understand the […]
Implementing the Digital Personal Data Protection Act 2023: A Strategy for Businesses
The Digital Personal Data Protection Act (DPDPA) 2023 represents a pivotal shift in how personal […]
Topic: Wazuh Deployment Guide
Objective: Wazuh component and architecture Wazuh Deployment Guide Hardware Requirements The hardware requirements for your […]