Osama AvvanAndroid SSL Pinning Bypass (Part 1)Hi Folks, I hope you are all doing well. I will be doing a series of writeups for the SSL Pinning Bypass for Android, we will be starting…May 28, 2024A response icon2May 28, 2024A response icon2
Spectat0rguyFinding Exposed Sensitive API Keys in JS FilesAutomating Hunting ForAPI Tokens in .js FilesFeb 2A response icon3Feb 2A response icon3
Spectat0rguyFinding Exposed Sensitive API Keys in JS FilesAutomating Hunting ForAPI Tokens in .js FilesFeb 2A response icon3Feb 2A response icon3
0xChinaaWebSocket API Penetration TestingPart 1 ( IDOR , XSS , Broken Access Control )Aug 4, 2024Aug 4, 2024
Asem ElerakyBypassing E2E encryption leads to multiple high vulnerabilities.In today’s blog, I’m going to show you how I was able to bypass the E2E encryption of an application by analyzing an obfuscated javascript…Jan 20, 2023A response icon10Jan 20, 2023A response icon10
InInfoSec Write-upsbyInfoSec Write-upsREVEALED: Best Way to Recover Lost or Deleted Data from SmartphonesSmartphones help us store everything from our favorite photos and videos to important documents and files. However, sometimes, things go…Jan 16A response icon1Jan 16A response icon1
0vulns 🇸🇩Bypassing KonyLab Code Protection: Hooking vs. Memory Dumping with FridaIn the realm of mobile application security, reverse engineering and bypassing code protection mechanisms are essential skills. Kony…Jan 3Jan 3
0d_samiiEasy P1: Unlocking Pro & Enterprise Features via Developer Tools (Inspect) due to insufficient…In the name of Allah, the Most Beneficent, the Most MercifulOct 17, 2024A response icon1Oct 17, 2024A response icon1
Noureldin Ehab | Creeper.exeHow to install Golang (latest version) on Kali LinuxSo i was trying to download Golang for a week now and this journey was full of ERRORs so i wrote this blog because i don't want anyone to…Jul 31, 2021A response icon2Jul 31, 2021A response icon2
Noureldin Ehab | Creeper.exeHow to install Golang (latest version) on Kali LinuxSo i was trying to download Golang for a week now and this journey was full of ERRORs so i wrote this blog because i don't want anyone to…Jul 31, 2021A response icon2Jul 31, 2021A response icon2
Amit DuttaA Deep Dive into Reverse-Engineering and Hacking Android Apps through Activity Exploits, Content…Hey! I am Amit Dutta, a penetration tester specializing in the dynamic domains of web and Android application security. With a passion for…Feb 29, 2024Feb 29, 2024
Anas H HmaidyHunting for Hidden API Endpoints Using Katana and HakrawlerSep 9, 2024A response icon16Sep 9, 2024A response icon16
bombonHow I Test For Web Cache Vulnerabilities + Tips And Tricks@bxmbnJul 21, 2022A response icon18Jul 21, 2022A response icon18
Mohammed EldeebThree Cases, Three Open Redirect BypassesHello,Apr 22, 2018A response icon5Apr 22, 2018A response icon5
0xoldNull Byte on SteroidsHello, I’m 0xold, a penetration tester who began exploring bug bounty hunting about 8 months ago. Today, I’ll be sharing a couple of…Feb 6, 2024A response icon12Feb 6, 2024A response icon12
Muhammad MaterAndroid Pentesting: #1 Anroid ArchitecturesHello ResearchersApr 23, 2023A response icon1Apr 23, 2023A response icon1
JEETPALEasiest way to find Broken links in a websiteHelloApr 6, 2024A response icon4Apr 6, 2024A response icon4
Abdelrhman Allam (sl4x0)How a ‘.git’ file Leads to Zendesk Panel Takeoverبِسْمِ اللَّهِ الرَّحْمَـٰنِ الرَّحِيمِApr 25, 2024A response icon1Apr 25, 2024A response icon1