Security Articles & Resources

Discover the latest cybersecurity articles, tutorials, and resources from around the web.

Showing 10 of 26 articles

How to Bypass Encryption Mechanism in Android Apps - InfoSec Write-ups

How to Bypass Encryption Mechanism in Android Apps - InfoSec Write-ups

Hi Folks, hope you are well. As you know developers and pentesters are always into a cat and mouse game. No matter how much we want to deny the fact but we make each other’s life a little tough…

Jaimin Gohel
Jun 01, 2025 1 min read
Android Pentesting Hacking Frida +2
Understanding Integer Overflow in Windows Kernel Exploitation – White Knight Labs

Understanding Integer Overflow in Windows Kernel Exploitation – White Knight Labs

In this blog post, we will explore integer overflows in Windows kernel drivers and cover how arithmetic operations can lead to security vulnerabilities. We will analyze real-world cases, build a custom vulnerable driver, and demonstrate how these flaws can impact memory allocations and system stabil

Jay Pandya
May 31, 2025 1 min read
kernel exploitation
Full-Blown SSRF to Gain Access to Millions of Users’ Records and Multiple Internal Panels

Full-Blown SSRF to Gain Access to Millions of Users’ Records and Multiple Internal Panels

This write-up details an SSRF vulnerability that allowed unauthorized access to millions of sensitive data and internal services.

Skyer
May 31, 2025 1 min read
Bug Bounty Cybersecurity Hacking +2
Grafana CVE-2025–4123: Full Read SSRF & Account Takeover

Grafana CVE-2025–4123: Full Read SSRF & Account Takeover

An open redirect happens when a web application takes a URL parameter and redirects the user to the specified URL without validating it. This might not seem dangerous on its own, but this type of bug…

Alvaro Balada
May 31, 2025 1 min read
Cybersecurity Bug Bounty Infosec +1
Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE | Karma(In)Security

Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE | Karma(In)Security

This is the personal website of Egidio Romano, a very curious guy from Sicily, Italy. He's a computer security enthusiast, particularly addicted to webapp security.

Egidio Romano
May 31, 2025 1 min read
vbulleting rce
Writing your first Frida script for Android

Writing your first Frida script for Android

Overview

Rajveersinh Parmar
May 31, 2025 1 min read
mobile application pentest android frida
Automating MS-RPC vulnerability research

Automating MS-RPC vulnerability research

Diving into the MS-RPC protocol and how to automate vulnerability research using a fuzzing approach.

Remco van der Meer
May 30, 2025 1 min read
Active Directory
Kubernetes Security Basics: From a Pentester’s Point of View

Kubernetes Security Basics: From a Pentester’s Point of View

Explore Kubernetes security from a pentester's point of view. Follow a hands-on walkthrough from reconnaissance to root access, focusing on network packet analysis, exploitation techniques, and cluster misconfigurations.

Bhavik Kanejiya
May 30, 2025 1 min read
Kubernetes Security
A step-by-step Android penetration testing guide for beginners

A step-by-step Android penetration testing guide for beginners

As I’m presently engaged in Android penetration testing, I’d like to relay my experiences with you, as they may prove beneficial in addressing some of the inquiries, I had difficulty resolving…

Sandeep Vishwakarma
May 28, 2025 1 min read
Android Pentest Mobile Testing Mobile Hacking +2
Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 1

Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 1

Introduction: Navigating the Android Abyss

Hacker's Dump
May 28, 2025 1 min read
Android Android Pentesting Penetration Testing +2
Showing page 1 of 3 (26 total articles)