Basic Overview of API
What is an API and How Do They Work? In the process of improving your applications, you will eventually come […]
What is an API and How Do They Work? In the process of improving your applications, you will eventually come […]
File transfer cheatsheet for pentesters aims to provide most common ways to send files between machines during engagements . Hosting […]
This nmap scanning cheatsheet is a comprehensive guide for absolute beginners . At the end of the blog some useful […]
This blog explains the procedure to analyze and identify potential security vulnerabilities in the files present in the IPA file […]
The Regular Expressions quick cheatsheet for pentesters topic in code review is explained by Jonny Fox . The entire credit […]
This blog series is aimed at giving security practitioners (both defense & offense ) a thorough understanding of Windows access […]
The Windows operating system implements a default set of authentication protocols, including Kerberos, NTLM, Transport Layer Security/Secure Sockets Layer (TLS/SSL), […]
The NT Architecture of Windows, a line of operating systems produced and sold by Microsoft, is a layered design that […]
In the current world of increased data requirements, cloud storage is like a blessing. That’s the reason Onedrive, Mega, Google […]
In the previous post, we covered the process of installing Pfsense. In this post, we’ll be doing pfsense configuration to […]
WhatsApp us for trainings & demos