Published inInfoSec Write-upsParam Hunting to InjectionsHey hackers! How’s your week going?Dec 16, 20222Dec 16, 20222
Published inInfoSec Write-upsFrida & Objection without Jailbreak! 🔥🔥So are you the one who stops security testing if Jailbreak Detection is not bypassed?? No worries, we have got you covered! A method to…Nov 16, 20222Nov 16, 20222
Published inInfoSec Write-upsCool Recon techniques every hacker misses! Episode 3🔥🔥Welcome to the 3rd Episode of Cool Recon Techniques. We are back with some more cool recon techniques which we think hackers out there…Nov 8, 20223Nov 8, 20223
Published inInfoSec Write-upsAndroid Pentesting 101 — Part 3Welcome to Part 3 of Android Pentesting. This series is about how you can hack into Android and find vulnerabilities in it using various…Oct 30, 20221Oct 30, 20221
Published inInfoSec Write-upsAndroid Pentesting 101 — Part 2Welcome to Part 2 of Android Pentesting. This series is about how you can hack into Android and find vulnerabilities in it using various…Oct 25, 2022Oct 25, 2022
Published inInfoSec Write-upsAndroid Pentesting 101 — Part 1Welcome to this new series of Android Pentesting. This series is about how you can hack into Android and find vulnerabilities in it using…Oct 22, 20221Oct 22, 20221
Published inInfoSec Write-upsBugcrowd — Tale of multiple misconfigurations!! ❌Welcome to this new article. This article is a story about misconfigurations found on a domain. Since it is a private program let’s call…Oct 4, 20222Oct 4, 20222
Published inInfoSec Write-upsCool Recon techniques every hacker misses! Episode 2🔥🔥Welcome to the 2nd Episode of Cool Recon Techniques. We are back with some more cool recon techniques which we think hackers out there…Sep 18, 20225Sep 18, 20225
Published inInfoSec Write-upsMass Hunting CVE’s Part-1👀🔥CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security flaws. A CVE number uniquely…Aug 31, 20224Aug 31, 20224
Published inInfoSec Write-upsCool Recon techniques every hacker misses! 🔥🔥Welcome to this article! This article is about some cool recon techniques every hacker misses! Tighten your belts as we walk you through…Aug 23, 202210Aug 23, 202210