BLOG |

Stay up to date with Payatu blog

BLOG |

Stay up to date with Payatu blog

Flying Securely: An Introduction to Drone Security 

Drones have rapidly emerged as a cutting-edge technology that has transformed various industries and everyday activities. These flying machines are equipped with advanced sensors, cameras, …

Read More →

Learning to Reverse Engineer with GDB

What is Reverse Engineering? Reverse engineering means to break down an object into simpler constituent parts and learn about its internal workings. What is GDB? …

Read More →

Unravelling the Layers of Client-Side SQL Injection Vulnerabilities in Mobile Applications

Introduction: In the dynamic landscape of web and mobile applications, security remains a paramount concern. In this blog, we will delve into the world of …

Read More →

Navigating the Core Concepts: Basics of Active Directory Explained

Introduction : Embarking on a journey into the realm of Active Directory (AD) can be both exciting and overwhelming. In this blog series, we’ll unravel …

Read More →

How to Intercept Thick Client TCP Traffic?

One of our recent assessments required us to pentest a thick client application, for which we needed to inspect the HTTP communication between the thick …

Read More →

Exploring ways to exploit SSTI in Go Frameworks 

Server-Side Template Injection (SSTI) is one of the most common web vulnerabilities found in web applications and usually arises due to the dynamic generation of …

Read More →

Code Diff Analysis for SetParent Infinite Recursion Bug

The previous article, Denial Of Service In Windows 11 22H2, described an infinite recursion bug triggered by a crafted SetParent WINAPI call in the Windows …

Read More →

How OAuth Implicit Flow led to Hundreds of User Accounts Being Accessed? 

Introduction In this article, I delve into the potential vulnerabilities of OAuth Implicit Flow, specifically in gaining unauthorized access to user accounts due to a …

Read More →

Navigating the Depths of Deep Link Security

What is a deep link? Deep linking is the practice of embedding hyperlinks to specific content within a mobile application. This technique directs users to …

Read More →

Let’s make cyberspace secure together!

Requirements

Connect Now Form

What our clients are saying!

Trusted by

DOWNLOAD THE DATASHEET

Fill in your details and get your copy of the datasheet in few seconds

CTI Report
DOWNLOAD THE EBOOK

Fill in your details and get your copy of the ebook in your inbox

Ebook Download
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download ICS Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Cloud Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download IoT Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Code Review Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Red Team Assessment Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download AI/ML Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download DevSecOps Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Product Security Assessment Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Mobile Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Web App Sample Report