Security Articles & Resources

Discover the latest cybersecurity articles, tutorials, and resources from around the web.

Showing 10 of 28 articles

A step-by-step Android penetration testing guide for beginners

A step-by-step Android penetration testing guide for beginners

As I’m presently engaged in Android penetration testing, I’d like to relay my experiences with you, as they may prove beneficial in addressing some of the inquiries, I had difficulty resolving…

Sandeep Vishwakarma
May 28, 2025 1 min read
Android Pentest Mobile Testing Mobile Hacking +2
Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 1

Diving Deep: A Comprehensive Guide to Android Penetration Testing — Part 1

Introduction: Navigating the Android Abyss

Hacker's Dump
May 28, 2025 1 min read
Android Android Pentesting Penetration Testing +2
Thick Client Penetration Testing Methodology

Thick Client Penetration Testing Methodology

1 Introduction 2 Common Architectures of Thick Client applications 2.1 Two-Ttier architecture 2.2 Three-Tier architecture 3 How to test thick client applications? 3.1 Information Gathering 3.1.1...

Niv Levy
May 27, 2025 1 min read
Thick Client
Facebook bug: A Journey from Code Execution to S3 Data Leak
Featured

Facebook bug: A Journey from Code Execution to S3 Data Leak

A Tale of Two Threats: OS Command Injection and Data Leak in Meta’s (formerly Facebook) Careers Platform

Bipin Jitiya
May 27, 2025 1 min read
Cybersecurity Technology Programming +2
Stealing First Party Access Token of Facebook Users: Meta Bug Bounty

Stealing First Party Access Token of Facebook Users: Meta Bug Bounty

Hi, I am Saugat Pokharel from Kathmandu, Nepal. I am going to talk about one of my findings on Facebook. The vulnerability led to the…

Saugat Pokharel
May 27, 2025 1 min read
Bug Bounty Cybersecurity Hacking +2
Why JWTs Valid After Logout: A Pentester’s Guide to Testing and Securing Tokens

Why JWTs Valid After Logout: A Pentester’s Guide to Testing and Securing Tokens

Discover why JWTs stay valid after logout and how refresh tokens keep apps secure. A pentester’s clear guide to testing and fixing tokens.

Sid Joshi
May 27, 2025 1 min read
Jwt Exploitation Bug Bounty Pentesting +2
AEM Bug in Adobe

AEM Bug in Adobe

hi hackers

Muhammad Mater
May 27, 2025 1 min read
Bugbounty Writeup Hunting Bug Bounty Tips +2
MQTT Pentesting: Authentication, Authorization & Availability Attacks

MQTT Pentesting: Authentication, Authorization & Availability Attacks

Introduction:

Vaishali Nagori
May 27, 2025 1 min read
Iot Security Mqtt Pentesting +2
SSTI in mblog 3.5.1 - A tale of a glorified RCE (CVE-2024-28713) - vsociety

SSTI in mblog 3.5.1 - A tale of a glorified RCE (CVE-2024-28713) - vsociety

Write a blog analysis for a CVE

Shivam Bathla
May 26, 2025 1 min read
vsociety vicarius vulnerabilities +5
How I made $64k from deleted files — a bug bounty story
Featured

How I made $64k from deleted files — a bug bounty story

TL;DR — I built an automation that cloned and scanned tens of thousands of public GitHub repos for leaked secrets. For each repository I…

Sharon Brizinov
May 26, 2025 1 min read
Bug Bounty Github Hacking +1
Showing page 2 of 3 (28 total articles)