Explore Our Blog & Articles
Discover Our Research and Open Information Approach
HTTP Request Smuggling Explained: A Beginner’s Guide on identification and mitigation.
by Danish
December 10, 2024
There’s a Web application vulnerability called HTTP Request Smuggling that lets attackers sneak harmful requests into a system without detection...
Performing Android Static Analysis 101-A Complete Guide for Beginners
by Danish
December 10, 2024
Android Static Analysis is a foundational approach to identifying vulnerabilities in applications without executing...
Research Case Study: Supply Chain Security at Scale – Insights into NPM Account Takeovers
by Danish
November 18, 2024
Software supply chains are complex ecosystems where even a single vulnerability can lead to...
IDOR Case Study: Manipulating Billing Information and Viewing Payment History
by Danish
November 5, 2024
Manipulating Billing Information and Viewing Payment History: How IDOR and Response Manipulation Allowed Access...
Penetration Testing Steps: Beginner’s Guide
by Danish
November 5, 2024
Introduction: Penetration testing, also known to many as "pen testing," is when a simulated...
Exploiting pfsense Remote Code Execution – CVE-2022-31814
by Danish
August 9, 2024
Greetings everyone, In this write-up, we will be exploring the interesting exploitation that has...
Understanding JWT: Basics and Security Risks
by Danish
March 14, 2024
Introduction to JWT (JSON Web Token): JWT, or JSON Web Token, is a fundamental...