This article provides a detailed guide on code auditing Yonyou NC65 to obtain a CNVD high-risk certificate. It covers environment setup, debug configuration, an
Explore the detailed reverse engineering process of a fraudulent app that deceives users with unnecessary permissions and unencrypted data transmission. Learn a
This article discusses the process and details of analyzing a remote command execution vulnerability in a security management platform. It covers the token auth
This article explores the use of automation tools for identifying SQL injection vulnerabilities in a content management system (CMS). It covers techniques for d
Discover the dangers of BingoMod, a new Android malware that not only steals bank accounts but also clears device data. Learn how it spreads and operates to pro
Learn how to perform a penetration test on a foreign website by targeting a Weblogic server with the CVE-2017-10271 vulnerability. This detailed guide covers st
Explore how to efficiently perform penetration testing on encrypted HTTP requests using a custom Burp plugin. This article discusses the implementation of reque