Thinking about Requests in PentestingThe reason I want to wrap up this topic is just to keep all of my logic and comprehension of requests in pen testing, hacking. Why it’s…Jun 27, 2021Jun 27, 2021
Common vulnerabilities in mobile appsDuring the time doing mobile pentest, I’ve realized that developers are often implementing an insecure code which makes an application…Jun 27, 2021Jun 27, 2021
Crypto Wallet Local Storage AttackPDF: https://www.exploit-db.com/docs/46466Jun 27, 20211Jun 27, 20211