BLOG |

Stay up to date with Payatu blog

BLOG |

Stay up to date with Payatu blog

Dumping Firmware from eMMC

In this post, we’ll discuss a technique you can employ to read data from an eMMC chip and proceed with further analysis. The eMMC chip featured in this blog post is sourced from an EV scooter.

Read More »

Cryptography for CTFs

Hello everyone, this blog series demonstrates how to get started with cryptography challenges in CTFs and learn about common cryptography attacks in general. This blog

Read More »
HackTheBox Object Writeup

HackTheBox: Object Writeup 

Machine Name: Object  Difficulty: Hard  OS: Windows  Rating: 5.0/5.0  Summary  Object is a hard Windows machine (Retired) in hackthebox. It gives us hands-on experience working

Read More »
MSSP

Key Criteria for Choosing an MSSP

Managed security service providers (MSSPs) have become an essential component of modern cybersecurity strategies. With the increasing complexity and sophistication of cyber threats, organizations of

Read More »

Prototype Pollution 101

JavaScript, often abbreviated JS, is a programming language that is one of the core technologies of the World Wide Web, alongside HTML and CSS. As

Read More »

Insecure Deserialization in Java

Insecure Deserialization Computer data is generally organized in data structures such as arrays, records, graphs, classes, or other configurations for efficiency. When data structures need

Read More »

PCB Designing – Basics

PCB Designing-Basics Introduction This is the first blog of the series to discuss and learn the basics of PCB designing. In this blog we will

Read More »

Kubectl fields plugin

Introduction to Kubernetes Kubernetes is an open-source container orchestration system for automating application deployment, scaling, and management. kubectl provides a CLI interface to manage Kubernetes clusters. Kubectl enables

Read More »

writing an llvm pass for ctfs

Motive With a couple of my friends I recently organized nullcon’s HackIM ctf. I authored 0bfusc8 much An RE chall that had 11 solves during the CTF and I got

Read More »

DIVA

What is DIVA? DIVA (Damn insecure and vulnerable App) is an App intentionally designed to be insecure. We are releasing the Android version of Diva.

Read More »

CloudFuzz

CloudFuzz is an integrated software framework for security based fuzzing. The end goal is to provide a workflow that will allow continuous fuzzing and generate

Read More »

Expedition ML4SEC Part – 1

Machine learning is becoming a very ubiquitous technology. It is used to solve problems that are difficult or impossible to be solved by defining explicit

Read More »

Tiredful API Solution

I am writing this post to discuss how to use Tiredful API and what are the intended solution for the challenges. If you are reading

Read More »

CSAW CTF Finals 2017 WriteUps

CSAW CTF Finals were held from 9-11th Nov. We (chaitan94, jaiverma and sudhackar) participated as a team and finished overall 14th globally. We solved a couple of RE

Read More »

OAuth Security Overview

OAuth (Open Authorization) is an open standard protocol for authentication and authorization that enables the third-party application to obtain a limited access to an HTTP service.

Read More »

Firmware Visual Analysis Part-1

Introduction Firmware analysis gives more understanding about the embedded device and what it contains. It helps to, Identify vulnerabilities in the embedded device firmware. Improve

Read More »

Hacksys Extreme Vulnerable Driver

INTRODUCTION HackSys Extreme Vulnerable Driver is intentionally vulnerable Windows driver developed for security enthusiasts to learn and polish their exploitation skills at Kernel level. HackSys Extreme Vulnerable Driver caters wide range

Read More »

Let’s make cyberspace secure together!

Requirements

Connect Now Form

What our clients are saying!

Trusted by

DOWNLOAD THE DATASHEET

Fill in your details and get your copy of the datasheet in few seconds

DOWNLOAD THE EBOOK

Fill in your details and get your copy of the ebook in your inbox

Ebook Download

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download ICS Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Cloud Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download IoT Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Code Review Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Red Team Assessment Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download AI/ML Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download DevSecOps Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Product Security Assessment Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Mobile Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Web App Sample Report