Demystifying IPA Extraction: A Walkthrough with SSH and GUI ToolsDisclaimer: Educational purpose.Jan 6Jan 6
Create a security research device through a JailbreakDisclaimer: It is educational purpose for ios mobile security researchers.Jan 5Jan 5
DVAPI Walkthrough: API Penetration Testing: OWASP TOP 10 APIWelcome to the Damn Vulnerable API (DVAPI) project. This project is based on the OWASP API Top 10, 2023 Stable version, published on June…Oct 29, 20242Oct 29, 20242
Broken Object Property Level AuthorizationBroken Object Property Level Authorization refers to a category of vulnerabilities that includes two main subclasses: Excessive Data…Oct 25, 20241Oct 25, 20241
API Broken Authentication leads to account take-overAuthentication is a crucial element of web API security. Web APIs employ different authentication mechanisms to ensure data…Oct 23, 2024Oct 23, 2024
Hunting Broken Object Level AuthorizationToday, I am discussing BOLA, which is considered the number one vulnerability according to OWASP API.Oct 22, 2024Oct 22, 2024
Exploiting server-side parameter pollution in a REST APITo start API testing, you first need to find out as much information about the API as possible, to discover its attack surface.Oct 21, 2024Oct 21, 2024
Unauthenticated AWS IAM Principals Enumeration | Cloud Misconfiguration and Countermeasures.Context:Mar 13, 2024Mar 13, 2024
Get Situational Awareness in AWS with Cloudfox by Pwned LabsLab Creator : Ritesh GohilMar 9, 2024Mar 9, 2024
The voyage of LLM and discuss about Excessive Agency VulnerabilityWhat is LLM?Jan 19, 2024Jan 19, 2024