Understanding Stealer Logs and Its Role in Security Testing — Part 1 – Company Blog
A Thorough Exploration of Stealer Logs: What, How, and Case Study In the name of Allah, the Most Gracious, the Most Merciful. Note: This article has also...
A Thorough Exploration of Stealer Logs: What, How, and Case Study In the name of Allah, the Most Gracious, the Most Merciful. Note: This article has also...
Information Disclosure of Hardcoded Keys (in SQLite) and Encryption Algorithm (in AesFormula.js File) Resulting in Compromised the Real Credentials. In the name of Allah, the Most...
Common Method for Extracting and Analyzing .asar Files. In the name of Allah, the Most Gracious, the Most Merciful. This marks the third part of a...
Ways to Detect Electron-Based Applications both Manually and Automatically. In the name of Allah, the Most Gracious, the Most Merciful. This marks the second part of...
A Brief Overview of Electron Framework and Building a Simple Application. In the name of Allah, the Most Gracious, the Most Merciful. This marks the start...
The Story of How Allah Allowed Us to Obtain Super Admin Access Through a Chain of Vulnerabilities (Including the Use of a Data Leak Monitoring Platform)....
A simple story when Allah allowed me to successfully achieve P1 through a broken access control issue using an unexpected master ID of “0”. In the...
A simple story when Allah allowed me to get P1 by combining several issues, one of which was related to “weak credentials”. In the name of...
A story when Allah willed me to tried to optimize my findings in the Points-Only program to be able to get 6 paid P1 issues in...
A story about how I Finally could use an AD account that unenrolled to MFA, by using an EWS Misconfiguration to Access Email Inbox and (Having...