
Automated security scanning against VAmPI
How well automated API security scanners work against an al…
Welcome to my page! Here you will find topics related to cyber security, web development or other technology fields.
Bit about me: I am an enthusiast of cyber security with passion in web security. I like a lot online web challenges and I enjoy building websites or apps like the site you are viewing this message on. I am constantly looking into learning new things, so if you want to share something interesting with me, please go ahead!
How well automated API security scanners work against an al…
A full write-up for the InsecureSHop application, to serve …
How an insecure implementation of SetResult can lead to exp…
Learn how an AWS Cognito Identity Pool can be identified in…
A quick guide on how to instrument an Android APK with the …
See how you can download hunderds of apps from Play Store a…
What are the differences in between ssh local, remote and d…
Vulnerable REST API with OWASP top 10 vulnerabilities for A…
How to make an android service to run in the background rel…
See how to create your own RSS/Atom feed in your Wagtail si…
Encrypt your traffic with openssl when using bind or revers…
Are you curious about how to detect the SELinux status of a…
An example on how to use Tiny AES in CBC mode with PKCS7 pa…
A python script to automate the use of dex2jar tool along w…
Tips and tricks in Wagtail that will help you tweak the app…
Hooking C/C++ code in Android application using Frida with …
How to add C/C++ through the JNI, into an existing Android …
A penetration testing bruteforcing tool running in cli with…
Search articles directly or articles with specific categories or tags!