Being_brutlixCyber Security Interview Questions-Prep 1Note- This is the first part of the article and there will be more upcoming parts with more questions. The second and third series will…May 26May 26
Being_brutlixAPI Key Leak Results in Mass Data Exposure, IDOR Vulnerabilities, and Unauthorized Profile ChangesWhile testing a mobile application, I discovered a critical security flaw that led to an API key leak. This leak resulted in mass data…May 24May 24
Being_brutlixThe Art of SSL Pinning Bypass on Unrooted SmartphonesNote : Please ensure you have knowledge about Frida, Objection, and SSL pinning bypass techniques before proceeding.Apr 201Apr 201