Android Penetration Testing: WebView Attacks

Introduction Initially, there was a time when only HTML used

Thick Client Pentest Lab Setup: DVTA (Part 2)

In the previous article, we have discussed the Lab setup

Burp Suite for Pentester: Burp’s Project Management

A Burp project is basically a file over where we

Burp Suite for Pentester: Software Vulnerability Scanner & Retire.js

Not only the fronted we see or the backend we

A Comprehensive Data Recovery Solution

Are you looking for your important file which accidentally got

Burp Suite for Pentester: Active Scan++

Using Burp Suite as an automated scanner? Wondering right, even

Android Penetration Testing: Frida

Introduction Frida is a dynamic instrumentation toolkit that is used

Thick Client Pentest Lab Setup: DVTA

Thick client applications are not new and have been around

How to make a QR code to accept Bitcoin while keeping it secure

If you are planning on maintaining a Bitcoin-friendly business, or

Burp Suite for Pentester: Turbo Intruder

Is fuzzing your favourite attack type, but you didn’t enjoy

Burp Suite for Pentester: Burp Sequencer

Whenever we log into an application, the server issues a

Burp Suite For Pentester: HackBar

Isn’t it a bit time consuming and a boring task

Android Penetration Testing: Drozer

Introduction Drozer is an android application security testing framework developed

5 essential steps needed to set up a secure e-commerce website

E-commerce is a profitable yet risky business due to increasing

iPhone Calendar Events spam is back: Here’s how to get rid of it

Remember the old annoying iPhone Calendar Events Spam? It’s back

Burp Suite for Pentester: Burp Collaborator

A number of vulnerabilities exist over the web, but the

How to Protect Yourself With a VPN

The words “stay safe” used to be only applied when

How to Avoid Identity Theft and Other Online Scams

One of the top scams worldwide is identity theft. With

What Is the Safest Backup Option Available to Regular Users

When it comes to the subject of backing up data,

How To Secure Your Business From Cyberattacks

All types of businesses are targeted by cyberattacks, so just