Open in app

Sign in

Write

Sign in

Avanish Pathak
Avanish Pathak

1.1K followers

Home

About

Insecure Deserialization: The Hidden Threat Behind Blindly Trusting User Inputs

In this article, we’ll cover what Insecure deserialization is and evaluate the consequences of blindly trusting any user-supplied input…

Aug 16, 2023
Insecure Deserialization: The Hidden Threat Behind Blindly Trusting User Inputs
Insecure Deserialization: The Hidden Threat Behind Blindly Trusting User Inputs
Aug 16, 2023

Getting started with Android Application Security

A starter’s guide to setting up a testbed, assessing, and finding vulnerabilities in android applications

Jun 8, 2021
Getting started with Android Application Security
Getting started with Android Application Security
Jun 8, 2021

An Account Takeover Vulnerability Due to Response Manipulation.

- No doesn’t necessarily mean no.! Responses can always be manipulated

Jan 30, 2021
4
An Account Takeover Vulnerability Due to Response Manipulation.
An Account Takeover Vulnerability Due to Response Manipulation.
Jan 30, 2021
4
The Startup

Published in

The Startup

An Interesting Account Takeover Vulnerability

- Login feature bypassed which leads to an Interesting Account Takeover

Jan 30, 2021
5
An Interesting Account Takeover Vulnerability
An Interesting Account Takeover Vulnerability
Jan 30, 2021
5
Avanish Pathak

Avanish Pathak

1.1K followers

Security Consultant at CPX | Lead Pentester @Cobalt_io | Synack Red Team member @Synack | Acknowledged by Google, Microsoft, Apple, and 50+

Following
  • Meet Sodha

    Meet Sodha

  • Santosh Bitra

    Santosh Bitra

  • Prasoon Gupta

    Prasoon Gupta

  • Adrien

    Adrien

See all (13)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech