Ways to Detect Electron-Based Applications both Manually and Automatically.
In the name of Allah, the Most Gracious, the Most Merciful.
This marks the second part of a series of articles exploring the fundamentals of security testing for Electron-based applications.
In this part, we will explore the essential processes of installing and detecting installed Electron-based applications, including the way to detect the presence of Electron applications on various operating systems — both manually and automatic.
In the previous part, we have explained the overview of electron, how electron works, and simple steps needed to create a simple electron-based application.
Note: This article has been published on the company blog where I am employed. Please visit the post for more details: