Application Mobile Network

AWS Penetration Testing: Essential Guidance for 2021

Pentesting on AWS can be difficult. With this guide you can ensure your pentest gets off to a successful start.


Developing Like A Pentester – (And How To Reproduce Any Vulnerability)

Reproducing vulnerabilities from a pentest report is a pain, but with just a few simple tips it doesn’t have to be.


Pentesting User Interfaces: How to Phish Any Chrome, Outlook, or Thunderbird User

In this blog post, we demonstrate how graphical user interfaces could be vulnerable to spoofing attacks by using certain Unicode characters.


5 Tips for selecting a penetration testing company in 2020

Selecting a penetration testing company can be a pain. Here are five important tips to ensure you penetration testing vendor will set you up for success.


Evading Antivirus with Better Meterpreter Payloads

Ever have meterpreter shells consistently fail? Anti-virus products may be causing your penetration tests to fall flat. By using unique encoded meterpreter shells you can avoid AV and elevate your penetration tests.


Tale of a Wormable Twitter XSS

This is a tale of how we found a wormable XSS on Twitter, and how we managed to fully bypass its CSP policy.