Security Articles & Resources

Discover the latest cybersecurity articles, tutorials, and resources from around the web.

Showing 6 of 6 articles

HubSpot Full Account Takeover in Bug Bounty - InfoSec Write-ups

HubSpot Full Account Takeover in Bug Bounty - InfoSec Write-ups

Hi everybody, our story today will be about how I was able to get a Full account takeover on HubSpot Public Bug Bounty Program at Bugcrowd platform While I was testing authentication functions I came…

Omar Hashem
Jun 04, 2025 1 min read
Bug Bounty Cybersecurity Hacking +2
How to Bypass Encryption Mechanism in Android Apps - InfoSec Write-ups

How to Bypass Encryption Mechanism in Android Apps - InfoSec Write-ups

Hi Folks, hope you are well. As you know developers and pentesters are always into a cat and mouse game. No matter how much we want to deny the fact but we make each other’s life a little tough…

Jaimin Gohel
Jun 01, 2025 1 min read
Android Pentesting Hacking Frida +2
A step-by-step Android penetration testing guide for beginners

A step-by-step Android penetration testing guide for beginners

As I’m presently engaged in Android penetration testing, I’d like to relay my experiences with you, as they may prove beneficial in addressing some of the inquiries, I had difficulty resolving…

Sandeep Vishwakarma
May 28, 2025 1 min read
Android Pentest Mobile Testing Mobile Hacking +2
Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 1

Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 1

Introduction: Navigating the Android Abyss

Hacker's Dump
May 28, 2025 1 min read
Android Android Pentesting Penetration Testing +2
Why JWTs Valid After Logout: A Pentester’s Guide to Testing and Securing Tokens

Why JWTs Valid After Logout: A Pentester’s Guide to Testing and Securing Tokens

Discover why JWTs stay valid after logout and how refresh tokens keep apps secure. A pentester’s clear guide to testing and fixing tokens.

Sid Joshi
May 27, 2025 1 min read
Jwt Exploitation Bug Bounty Pentesting +2
MQTT Pentesting: Authentication, Authorization & Availability Attacks

MQTT Pentesting: Authentication, Authorization & Availability Attacks

Introduction:

Vaishali Nagori
May 27, 2025 1 min read
Iot Security Mqtt Pentesting +2