Phyo WaThone WininInfoSec Write-upsDomain Enumeration with PowerShell| Active Directory Penetration TestingIntroductionJul 26Jul 26
Phyo WaThone WinAPI Pentesting Series — Type of APIIt is a set of rules and protocols for building and interacting with software applications. APIs allow different software systems to…Jul 6Jul 6
Phyo WaThone WininOSINT TeamMobile Capture the Flag (CTF) with Beetlebug Vulnerable APKCapture the Flag (CTF) competitions are an excellent way for cybersecurity enthusiasts to hone their skills in a practical, hands-on…Jul 5Jul 5
Phyo WaThone WinVulnerability Scanning for Android Application with Vooki (Yaazhini)IntroductionJun 30Jun 30
Phyo WaThone WininOSINT TeamLearn Android Penetration Testing Skill with This Vulnerable APKIn the realm of cybersecurity, pentesting (penetration testing) is a critical skill that helps identify and mitigate vulnerabilities in…Jun 26Jun 26
Phyo WaThone WininOSINT TeamSensitive Information, Endpoint, Hardcode Finding in Android PentestingIn the context of Android pentesting (penetration testing), hardcoding refers to embedding sensitive information or configuration data…Jun 23Jun 23
Phyo WaThone WininInfoSec Write-upsAndroid Penetration Testing + Nuclei (Automated Android Pentesting)In the ever-evolving landscape of mobile security, ensuring the robustness of Android applications is paramount. As developers implement…Jun 22Jun 22
Phyo WaThone WininInfoSec Write-upsInsecure Webview to Local File Inclusion in Android PentestingWhat is WebView in Android?Jun 13Jun 13
Phyo WaThone WininInfoSec Write-upsOWASP Mobile Top 10 for Android Penetration Testing and Checklist1. Improper Credential UsageJun 11Jun 11