Security Articles & Resources

Discover the latest cybersecurity articles, tutorials, and resources from around the web.

Showing 10 of 30 articles

Automating MS-RPC vulnerability research

Automating MS-RPC vulnerability research

Diving into the MS-RPC protocol and how to automate vulnerability research using a fuzzing approach.

Remco van der Meer
May 30, 2025 1 min read
Active Directory
Kubernetes Security Basics: From a Pentester’s Point of View

Kubernetes Security Basics: From a Pentester’s Point of View

Explore Kubernetes security from a pentester's point of view. Follow a hands-on walkthrough from reconnaissance to root access, focusing on network packet analysis, exploitation techniques, and cluster misconfigurations.

Bhavik Kanejiya
May 30, 2025 1 min read
Kubernetes Security
A step-by-step Android penetration testing guide for beginners

A step-by-step Android penetration testing guide for beginners

As I’m presently engaged in Android penetration testing, I’d like to relay my experiences with you, as they may prove beneficial in addressing some of the inquiries, I had difficulty resolving…

Sandeep Vishwakarma
May 28, 2025 1 min read
Android Pentest Mobile Testing Mobile Hacking +2
Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 1

Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 1

Introduction: Navigating the Android Abyss

Hacker's Dump
May 28, 2025 1 min read
Android Android Pentesting Penetration Testing +2
Thick Client Penetration Testing Methodology

Thick Client Penetration Testing Methodology

1 Introduction 2 Common Architectures of Thick Client applications 2.1 Two-Ttier architecture 2.2 Three-Tier architecture 3 How to test thick client applications? 3.1 Information Gathering 3.1.1...

Niv Levy
May 27, 2025 1 min read
Thick Client
Facebook bug: A Journey from Code Execution to S3 Data Leak
Featured

Facebook bug: A Journey from Code Execution to S3 Data Leak

A Tale of Two Threats: OS Command Injection and Data Leak in Meta’s (formerly Facebook) Careers Platform

Bipin Jitiya
May 27, 2025 1 min read
Cybersecurity Technology Programming +2
Stealing First Party Access Token of Facebook Users: Meta Bug Bounty

Stealing First Party Access Token of Facebook Users: Meta Bug Bounty

Hi, I am Saugat Pokharel from Kathmandu, Nepal. I am going to talk about one of my findings on Facebook. The vulnerability led to the…

Saugat Pokharel
May 27, 2025 1 min read
Bug Bounty Cybersecurity Hacking +2
Why JWTs Valid After Logout: A Pentester’s Guide to Testing and Securing Tokens

Why JWTs Valid After Logout: A Pentester’s Guide to Testing and Securing Tokens

Discover why JWTs stay valid after logout and how refresh tokens keep apps secure. A pentester’s clear guide to testing and fixing tokens.

Sid Joshi
May 27, 2025 1 min read
Jwt Exploitation Bug Bounty Pentesting +2
AEM Bug in Adobe

AEM Bug in Adobe

hi hackers

Muhammad Mater
May 27, 2025 1 min read
Bugbounty Writeup Hunting Bug Bounty Tips +2
MQTT Pentesting: Authentication, Authorization & Availability Attacks

MQTT Pentesting: Authentication, Authorization & Availability Attacks

Introduction:

Vaishali Nagori
May 27, 2025 1 min read
Iot Security Mqtt Pentesting +2
Showing page 2 of 3 (30 total articles)