Reverse Engineering a Xamarin Application.

Categories: Android Pentesting
Solidity: Functions.

Categories: Solidity - Series
Solidity: Constructors and Inheritance.

Categories: Solidity - Series
Solidity: Function Modifiers.

Categories: Solidity - Series
Solidity: Events.

Categories: Solidity - Series
Solidity: Variables, Modifiers and Types.

Categories: Solidity - Series
Solidity: Basic Smart Contract Structure.

Categories: Solidity - Series
Solidity: Smart Contracts.

Categories: Solidity
On the Cyber skills for the long run.

Categories: General
The OSWE in Review.

Categories: General
Dissecting SIM Jacker – Part 4 of 4: Exploitation.

Categories: General, SIM-Jacker
Dissecting SIM Jacker – Part 3 of 4: SIM Tester.

Categories: General, SIM-Jacker
Dissecting SIM Jacker – Part 2 of 4: OTA Messages.

Categories: General, SIM-Jacker
Dissecting SIM Jacker – Part 1 of 4: SIM & SMS Basics.

Categories: General, SIM-Jacker
Exploiting Android Components: Loading arbitrary URLs in a Webview.

Categories: Android Pentesting
Dumping Android application memory with fridump

Categories: Android Pentesting
Exploiting Android Components: Abusing Activities.

Categories: Android Pentesting
10 things you must do when Pentesting Android Applications.

Categories: Android Pentesting
SSL pinning bypass with frida-gadget (gadget-injector.py)

Categories: Android Pentesting
Bypassing Android SSL Pinning with FRIDA

Categories: Android Pentesting
Your journey to anonymity starts here: [Kali + Whonix Gateway + VPN].

Categories: Kali Linux
Writing your first Smart Contract. [The true power of blockchain] – Part 2

Categories: Crypto
What are Smart Contracts? [The true power of blockchain] – Part 1

Categories: Crypto
Penetration testing basics & Kali Linux by Offensive Security.

Categories: Kali Linux
Understanding hashes and blockchains.

Categories: Crypto
Browser-based cryptocurrency mining.

Categories: Crypto
Mobile Risks: M3 – Insecure communication.

Categories: Android Pentesting
Trusting user installed certificates via reverse engineering.

Categories: Android Pentesting
Intercepting traffic on an Android application.

Categories: Android Pentesting
Mobile Risks: M2 – Insecure data storage.

Categories: Android Pentesting
Reverse engineering an Android application.

Categories: Android Pentesting
Dumping and analyzing application memory in Android.

Categories: Android Pentesting
Viewing and analyzing Android logs with logcat.

Categories: Android Pentesting
Manually inject a meterpreter payload.

Categories: Android Pentesting
How to exploit Android backup.

Categories: Android Pentesting
Building openssl with zlib support.

Categories: General
Mobile Risks: M1 – Improper platform usage.

Categories: Android Pentesting
How to exploit a debuggable Android application.

Categories: Android Pentesting
Using the drozer framework for Android Pentesting.

Categories: Android Pentesting
Recent Comments