This article details the process of testing a Flutter framework app for vulnerabilities. The author encountered challenges in capturing packets and eventually d
This article provides a detailed analysis of an interesting fishing sample that evades sandbox detection. It explores the techniques used in the sample and its
Learn how to identify high-reward vulnerabilities through JavaScript monitoring. This article details a Google Docs link leak and its potential impact on user d
Explore the typical vulnerabilities in enterprise management systems like ERP, including SMS forgery, registration abuse, privilege escalation, and more. This g
This article summarizes key tips on executing phishing attacks during red team penetration tests. It covers various scenarios like OA users with weak passwords
Learn how to bypass Web Application Firewall (WAF) by using junk characters when uploading files. This article details a successful method used in penetration t
Discover the dangers of BingoMod, a new Android malware that not only steals bank accounts but also clears device data. Learn how it spreads and operates to pro