Insecure Deserialization: The Hidden Threat Behind Blindly Trusting User InputsIn this article, we’ll cover what Insecure deserialization is and evaluate the consequences of blindly trusting any user-supplied input…Aug 16, 2023Aug 16, 2023
Getting started with Android Application SecurityA starter’s guide to setting up a testbed, assessing, and finding vulnerabilities in android applicationsJun 8, 2021Jun 8, 2021
An Account Takeover Vulnerability Due to Response Manipulation.- No doesn’t necessarily mean no.! Responses can always be manipulatedJan 30, 20213Jan 30, 20213
An Interesting Account Takeover Vulnerability- Login feature bypassed which leads to an Interesting Account TakeoverJan 30, 20215Jan 30, 20215