We have seen HTTP request smuggling attack by modifying the Content-Length and Transfer-Encoding header. These methods exploit the execution of the headers in client-side and …
This blog describes the attempts, as part of the Payatu Research Team, to fuzz and find vulnerabilities in Windows Kernel. We start the blog by …
Why Pentest Mapper? Burp Suite’s Pentest Mapper plugin integrates a unique application testing checklist with request logging capabilities of Burp Suite. An easy-to-follow flow is …
Managed security service providers (MSSPs) have become an essential component of modern cybersecurity strategies. With the increasing complexity and sophistication of cyber threats, organizations of …
As penetration testers/security researchers you often come across firewalls configured with egress/ingress filtering that makes it difficult to spawn a shell. In this blog, we …
Why ATOR? The Authentication Token Obtain and Replace (ATOR) Burp plugin handles complex login sequences because it allows the user to obtain and replace authentication …
An active directory allows network administrators to manage domains, users, and objects in a respective network. Now, as the network grows, the AD provides a …
In a network, computers are addressed with numerical values called IP addresses. Computers use these IP address to communicate with each other. Since these values …
Introduction Cross-platform applications have been emerging in recent years. The React Native framework is also gaining lots of traction in the world of mobile application …
Research Powered Cybersecurity Services and Training. Eliminate security threats through our innovative and extensive security assessments.
Let’s make cyberspace secure together!
Requirements
What our clients are saying!
Trusted by
Fill in your details and get your copy of the datasheet in few seconds
Fill in your details and get your copy of the ebook in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds