Ender PhanThinking about Requests in PentestingThe reason I want to wrap up this topic is just to keep all of my logic and comprehension of requests in pen testing, hacking. Why it’s…6 min read·Jun 27, 2021----
Ender PhanCommon vulnerabilities in mobile appsDuring the time doing mobile pentest, I’ve realized that developers are often implementing an insecure code which makes an application…10 min read·Jun 27, 2021----
Ender PhanCrypto Wallet Local Storage AttackPDF: https://www.exploit-db.com/docs/4646610 min read·Jun 27, 2021--1--1
Ender PhanSmart Contract Automated Testing GuidelinesAuthor: enderlocphan@gmail.com7 min read·Jun 27, 2021----