Ender PhanThinking about Requests in PentestingThe reason I want to wrap up this topic is just to keep all of my logic and comprehension of requests in pen testing, hacking. Why it’s…Jun 27, 2021Jun 27, 2021
Ender PhanCommon vulnerabilities in mobile appsDuring the time doing mobile pentest, I’ve realized that developers are often implementing an insecure code which makes an application…Jun 27, 2021Jun 27, 2021
Ender PhanCrypto Wallet Local Storage AttackPDF: https://www.exploit-db.com/docs/46466Jun 27, 20211Jun 27, 20211
Ender PhanSmart Contract Automated Testing GuidelinesAuthor: enderlocphan@gmail.comJun 27, 2021Jun 27, 2021