Explore Our Blog & Articles
Discover Our Research and Open Information Approach
API Penetration Testing 101: A Beginner’s Guide to Securing APIs
APIs (Application Programming Interfaces) are essential tools that allow different software systems to communicate with each other. A practical example...
HTTP Request Smuggling Explained: A Beginner’s Guide on identification and mitigation.
There’s a Web application vulnerability called HTTP Request Smuggling that lets attackers sneak harmful...
Performing Android Static Analysis 101-A Complete Guide for Beginners
Android Static Analysis is a foundational approach to identifying vulnerabilities in applications without executing...
Research Case Study: Supply Chain Security at Scale – Insights into NPM Account Takeovers
Software supply chains are complex ecosystems where even a single vulnerability can lead to...
IDOR Case Study: Manipulating Billing Information and Viewing Payment History
Manipulating Billing Information and Viewing Payment History: How IDOR and Response Manipulation Allowed Access...
Penetration Testing Steps: Beginner’s Guide
Introduction: Penetration testing, also known to many as "pen testing," is when a simulated...
Exploiting pfsense Remote Code Execution – CVE-2022-31814
Greetings everyone, In this write-up, we will be exploring the interesting exploitation that has...