Homepage
Open in app
Sign in
Get started
Secarma Labs
The latest cyber security research from the experts at Secarma.
About
All Posts
Secarma Home
Follow
Using Visual Studio Code Extensions for Persistence
Using Visual Studio Code Extensions for Persistence
With Visual Studio Code being the tool of choice in most development environments (I know, I love it!), it only makes sense to look at…
Charley Célice
Jul 13, 2020
Escaping Restricted Shell through Insecure Consul API
Escaping Restricted Shell through Insecure Consul API
Escaping jailed or restricted environments comes with its own set of challenges. However, more often than not, there’s going to be a way…
Charley Célice
Jun 30, 2020
Bypassing Android’s RootBeer Library (Part 2)
Bypassing Android’s RootBeer Library (Part 2)
In the first part of this post, I discussed one method to bypass RootBeer Library through code manipulation. However, installing and…
Elvin Gentiles
Jun 15, 2020
Comparison of Different Android Root-Detection Bypass Tools
Comparison of Different Android Root-Detection Bypass Tools
When testing Android applications, it is recommended to use a rooted device to perform the assessment efficiently and thoroughly. However…
Elvin Gentiles
May 27, 2020
Elvin Gentiles
May 27, 2020
Bypassing Android’s RootBeer Library — Part 1
In my previous post, I made a comparison between the different well-known and…
Read more…
34
1 response
About Secarma Labs
Latest Stories
Archive
About Medium
Terms
Privacy
Teams