PinnedPublished inInfoSec Write-upsIOS Penetration Testing: Guide to Static TestingDuring an iOS application penetration test, a penetration tester utilizes a range of techniques, tools, and methodologies to evaluate the…Apr 23, 2024Apr 23, 2024
Published inInfoSec Write-upsOWASP Top 10 2025: What to ExpectThe OWASP Top 10 is set for its next update in early 2025. According to OWASP’s official page, the data collection process is currently…Dec 29, 20241Dec 29, 20241
Published inInfoSec Write-upsI Studied 100+ SSRF Reports, and Here’s What I LearnedAfter diving into over 100 write-ups and reports on Server-Side Request Forgery (SSRF), I’ve compiled the key insights and knowledge I’ve…Oct 6, 20245Oct 6, 20245
Published inInfoSec Write-upsIDOR Leads To Account TakeoverIDOR, one of the most common vulnerabilities in applications, can lead to major security leaks. Today, I’ll walk you through how I…Apr 7, 20242Apr 7, 20242