PinnedINMUNE7Our Top 5 favorites Mobile Hacking ToolsHacking tools very useful for mobile security.Dec 21, 20223Dec 21, 20223
INMUNE7Attacking React Native Applications- IntroDepending of the frameworks and technologies in mobile applications, penetration tester can choose a specific methodology to perform a…Mar 8, 2023Mar 8, 2023
INMUNE7Egg Hunter: looking for a needle in a haystackIn this blog post we're going to deep into the Egg Hunter Technique. In order to understand what this technique involves we're going to…Jan 20, 2022Jan 20, 2022
INMUNE7Creating a shellcode: Reverse tcp shellIn this blog post, we're going to create a working demo of reverse TCP shellcode. This kind of shellcode is useful in the situation when…Jan 13, 20221Jan 13, 20221
INMUNE7Android Pentesting Lab — Android StudioInstalling and configuring Android StudioAug 3, 2020Aug 3, 2020
INMUNE7Android pentesting Lab — Drozer & mobSFIn the previous article, we mentioned the installation and configuration process of a lab on Linux to perform penetration testing and…Jul 30, 2020Jul 30, 2020
INMUNE7How did I bypass a Custom Brute Force protection and why that solution is not a good idea?A bug hunter history …May 25, 2019May 25, 2019
INMUNE7Android pentest lab in a nutshellA beginner guide to setup Android pentesting labMay 19, 2019May 19, 2019