Yauhen SlizhWhat is Detekt and how to set it up to use in a project? Part 1.Hello, developers! I want to share my experience working with Detekt. Over the course of several articles, I’ll try to explain how to use…1d ago1d ago
Ammar YasserImproving Code Quality in Flutter: A Guide to Linting and Static AnalysisEnsuring high-quality code in Flutter projects is essential for maintaining consistency and avoiding potential issues. In this article…2d ago2d ago
Akshat MittalBlueprints for Brilliance: A Deep Dive into Design PatternsWhat are design patterns?Aug 19Aug 19
Hacktivist-AttackerGathering Secrets Of The Web Applications🧐..Welcome Everybody..I Think that the title of the Blog might gets Exciting😃. Yeah.., Like we Hunted Secrets on the application’s…Aug 161Aug 161
ReconeyesExploring Smart Contract Vulnerability Detection with Reconeyes: Static Analysis vs.Smart contracts are the backbone of decentralized applications (DApps) and form an integral part of blockchain ecosystems. However, these…Aug 16Aug 16
Miguel Lopez LuisUnveiling Malware: A Comprehensive Analysis Using Any.Run and SysinternalsIn today’s cybersecurity landscape, understanding the behavior and impact of malware is critical. As part of my CYBR 440 — Incident…Aug 11Aug 11
Akarsh Seggemu, M.Sc.Meetup: Quality Engineering August 2024Engineers, product managers, and quality assurance engineers came together for a wonderful evening to share knowledgeAug 8Aug 8
alMy Ways of Decrypting IPA FileSo, here’s the deal — I tend to forget things, especially when it comes to all the steps and tools I use for decrypting IPA files. That’s…Aug 8Aug 8
Usman SikanderinOSINT TeamArsenal 2.0: Elevating Malware Stealth Tactics to bypass static detectionNote: This blog is an extension of my previous post, “Arsenal: Bypass EDR’s/XDR’s and make malware analysis harder.” In this follow-up, i…Jul 26Jul 26