Published inProDefenseHacking Android Apps With FridaFinding AWS Credentials in Android AppsFeb 26, 2024Feb 26, 2024
Published inProDefenseHacking SEO: Getting to the Top with AI-Generated ContentHow to make your website the TOP Google search.Aug 6, 2023Aug 6, 2023
Published inProDefenseAccessing Hundreds of RDS Databases with AD Credentials Using Python and JDBCOvercoming Network Domain Authentication Challenges to Achieve Large-Scale Database AccessAug 5, 20231Aug 5, 20231
Published inProDefenseHow Abusing AWS CloudFormation Led to a Total Takeover of an AWS EnvironmentAttacking AWS CloudFormationJul 1, 2023Jul 1, 2023
Published inProDefenseSorting Your Way to Stolen PasswordsStealing password hashes using a character-by-character comparison methodMay 8, 2023May 8, 2023
Published inProDefenseUnraveling the Bug Bounty Goldmine: Innovative Approaches for Success in 2023Get ahead in the bug bounty game with new strategies, tools, and platformsMar 21, 2023Mar 21, 2023
Published inProDefenseHow to conduct stock market manipulation through cyber attacksStock market manipulation through cyber attacks is becoming an increasingly serious problem. Cybersecurity professionals have a critical…Mar 7, 2023Mar 7, 2023
Published inProDefenseTechnical Analysis: CircleCI BreachOn December 19th, 2022, a software engineer logged into the single sign-on (SSO) system that grants access to resources. After entering his…Jan 31, 2023Jan 31, 2023