Testing Compiled Applications

In this blog, Joe – one of our Testing Team Leads here at Secarma – takes you through his metho...

chaining vulnerabilities

Chaining Vulnerabilities for Account Takeover  

A vulnerability scan can help you find and fix key issues within your systems - and this automated p...

Bypassing Android’s RootBeer Library (Part 2)

In the first part of this post, I discussed one method to bypass RootBeer Library through code manip...

Understanding Common SSL/TLS Misconfigurations

Transport Layer Security (TLS) is a series of protocols for encrypted network communications. Transp...

Using Visual Studio Code Extensions for Persistence

With Visual Studio Code being the tool of choice in most development environments (I know, I love ...

Escaping Restricted Shell through Insecure Consul API

How We Got There Allowing file upload always brings additional risks to an application. Most common...