Yauhen SlizhWhat is Detekt and how to set it up to use in a project? Part 1.Hello, developers! I want to share my experience working with Detekt. Over the course of several articles, I’ll try to explain how to use…12h ago
Aditya SawantIOS Penetration Testing: Guide to Static AnalysisDuring an iOS application penetration test, a penetration tester utilizes a range of techniques, tools, and methodologies to evaluate the…Apr 23
Ammar YasserImproving Code Quality in Flutter: A Guide to Linting and Static AnalysisEnsuring high-quality code in Flutter projects is essential for maintaining consistency and avoiding potential issues. In this article…1d ago1d ago
alMy Ways of Decrypting IPA FileSo, here’s the deal — I tend to forget things, especially when it comes to all the steps and tools I use for decrypting IPA files. That’s…Aug 8Aug 8
Akshat MittalBlueprints for Brilliance: A Deep Dive into Design PatternsWhat are design patterns?Aug 19Aug 19
Yauhen SlizhWhat is Detekt and how to set it up to use in a project? Part 1.Hello, developers! I want to share my experience working with Detekt. Over the course of several articles, I’ll try to explain how to use…12h ago
Aditya SawantIOS Penetration Testing: Guide to Static AnalysisDuring an iOS application penetration test, a penetration tester utilizes a range of techniques, tools, and methodologies to evaluate the…Apr 23
Ammar YasserImproving Code Quality in Flutter: A Guide to Linting and Static AnalysisEnsuring high-quality code in Flutter projects is essential for maintaining consistency and avoiding potential issues. In this article…1d ago
alMy Ways of Decrypting IPA FileSo, here’s the deal — I tend to forget things, especially when it comes to all the steps and tools I use for decrypting IPA files. That’s…Aug 8
Akshat MittalBlueprints for Brilliance: A Deep Dive into Design PatternsWhat are design patterns?Aug 19
Alex JohnHow I managed to get 92% on the GIAC GREM CyberLive exam!“It may seem difficult at first, but everything is difficult at first.” — Miyamoto MusashiMar 12, 20232
Hacktivist-AttackerGathering Secrets Of The Web Applications🧐..Welcome Everybody..I Think that the title of the Blog might gets Exciting😃. Yeah.., Like we Hunted Secrets on the application’s…Aug 161
Usman SikanderinOSINT TeamArsenal 2.0: Elevating Malware Stealth Tactics to bypass static detectionNote: This blog is an extension of my previous post, “Arsenal: Bypass EDR’s/XDR’s and make malware analysis harder.” In this follow-up, i…Jul 26