PinnedPublished inInfoSec Write-upsReverse Engineering a Native Desktop Application (Tauri App)You might extract some secrets from this!Dec 5, 20222Dec 5, 20222
PinnedPublished inInfoSec Write-upsExploiting Android Vulnerabilities with Malicious Third-Party Apps (featuring Oversecured APK)Mobile applications has become a trend these days since there are a rapid growing companies and startups which already taken their steps…Jul 15, 20221Jul 15, 20221
Published inInfoSec Write-upsThe Buffer CurseA tale of unusual exploitation in Web ApplicationJul 16, 2023Jul 16, 2023
Published inInfoSec Write-upsFlutter Hackers: Uncovering the Dev’s Myopia (Part 2)Deep dive in reverse engineering Flutter APK Release Mode with FridaMar 18, 2023Mar 18, 2023
Published inInfoSec Write-upsFlutter Hackers: Uncovering the Dev’s Myopia (Part 1)Life hack for understanding Flutter Application through source code leaksMar 18, 20232Mar 18, 20232
Published inInfoSec Write-upsClick Me and I Shall Conquer!An Art of Fooling Humans to Steal Your Data in One Click.Feb 26, 2023Feb 26, 2023
Published inInfoSec Write-upsExtracting an Unsaved Memory-Content by Walking through Windows Heaps, but How?Notes: Greetings fellow readers! Before you read this content, I’d like to remind you that this is based on my research and findings, so if…Sep 11, 20224Sep 11, 20224