How well automated API security scanners work against an already vulnerable API?
A full write-up for the InsecureSHop application, to serve for learning purposes
How an insecure implementation of SetResult can lead to exploitation of the available content providers.
Learn how an AWS Cognito Identity Pool can be identified in an APK and then checked if it is misconfigured.
A quick guide on how to instrument an Android APK with the help of the ASM library and extract information …
See how you can download hunderds of apps from Play Store automatically!
What are the differences in between ssh local, remote and dynamic port forwarding and when to use which? Explain it …
Vulnerable REST API with OWASP top 10 vulnerabilities for APIs
How to make an android service to run in the background reliably every N seconds even when the device is …
See how to create your own RSS/Atom feed in your Wagtail site fast and easy.
Search articles directly or articles with specific categories or tags!