SSL/TLS Misconfigurations

Understanding Common SSL/TLS Misconfigurations

In this blog, Thomas – one of our Testing Team Leads here at Secarma – takes you through the ins...

Testing Compiled Applications

In this blog, Joe – one of our Testing Team Leads here at Secarma – takes you through his metho...

chaining vulnerabilities

Chaining Vulnerabilities for Account Takeover  

A vulnerability scan can help you find and fix key issues within your systems - and this automated p...

RootBeer Library

Bypassing Android’s RootBeer Library (Part 2)

In the first part of this post, I discussed one method to bypass RootBeer Library through code manip...

Using Visual Studio Code Extensions for Persistence

With Visual Studio Code being the tool of choice in most development environments (I know, I love ...

Consul API

Escaping Restricted Shell through Insecure Consul API

In this blog, the Secarma Labs team provide an overview on escaping restricted shell through insecur...