BLOG |

Stay up to date with Payatu blog

BLOG |

Stay up to date with Payatu blog

Pentesting Linux Thick Client Applications 

A thick client is a software application that has most of the resources installed locally for processing on typically a personal computer. Thick Clients follows …

Read More →

Exploring XPath in XML documents

What is XPATH? XPATH is a standard language used to query and navigate XML documents. It makes use of Path expressions to select node from …

Read More →

Denial of Service in Windows 11 22H2

As a part of our efforts to fuzz Windows Kernel using in-house WinK fuzzer [1], we were able to fuzz Windows 11 22H2 v22621.2283, x64 …

Read More →

Unveiling the Secrets of HTTP Host Header Attacks 

What is an HTTP Host Header? The HTTP Host header is a mandatory header field in an HTTP request that specifies the domain name of …

Read More →

Diving into Signal Intelligence – SIGINT

My Journey of Signal Intelligence Disclaimer: Transmission of radio signals is prohibitive in India. Please go through the following link before performing any activity with …

Read More →

Decoding Digital Personal Data Protection Act for Organizations

About The Digital Personal Data Protection Act, 2023 The Digital Personal Data Protection Act was passed by the President of India on 11th August, 2023.  …

Read More →

Unmasking Call Spoofing: Why We Need to Act Against It

In the present era of seamless communication and always-available phones, call spoofing is a new and unexpected concern. This scam manages caller identifying (Caller ID) …

Read More →

Protecting India’s Software Ecosystem: The Critical Role of SBOM in Application Security

Software is essential to our lives in today’s digital world, from communication to national security. The ecosystem of software in India is expanding rapidly and …

Read More →

HackTheBox Business CTF 2023 – Crypto

Payatu Bandits played the HackTheBox Business CTF 2023 and secured 1st rank in India, but overall, we secured 31st by the end of the tournament. …

Read More →

Let’s make cyberspace secure together!

Requirements

Connect Now Form

What our clients are saying!

Trusted by

DOWNLOAD THE DATASHEET

Fill in your details and get your copy of the datasheet in few seconds

CTI Report
DOWNLOAD THE EBOOK

Fill in your details and get your copy of the ebook in your inbox

Ebook Download
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download ICS Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Cloud Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download IoT Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Code Review Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Red Team Assessment Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download AI/ML Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download DevSecOps Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Product Security Assessment Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Mobile Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Web App Sample Report