Gender Equality in The Workplace | qSEAp
For any successful business, creating a fair and equitable workplace is essential.
22 February 2023
Read MoreLinux Privilege Escalation
Hello people this write-up is about how to escalate privilege in Linux.
11 November 2022
Read MoreSSTI (Server Side Template Injection)
Server side Template Injection or SSTI occurs when an attacker provides a malicious input to the application template which leads to executing commands on the server side.
26 August 2022
Read MoreAccess personal system through RDP from anywhere via OpenVPN Cloud
So, this write-up is all about accessing your home system via RDP from
anywhere through OpenVPN connection.
11 July 2022
Read MoreHow to Access a LAN resource over the Internet?
It is quite fascinating to know what we can do with the help of internet.
17 December 2021
Read MoreSSL Certificate Pinning Bypass – The Manual Approach!
SSL Certificate pinning is a process where an application on the ...
02 April 2021
Read MoreManaging Cyber-Attacks in a time of Pandemic
Do you think this pandemic can extend for a period of 6 months , 1 Year or 2 Years ? No Idea.
10 May 2021
Read MoreHacking Json Web Token
According to official website, JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained …
24 December 2020
Read MoreRoot Detection and SSL Pinning Bypass Using Xposed Framework
Root-detection process is used in Android to prevent users from using their app on a rooted device…
24 December 2020
Read MoreiOS Application Security Testing & Pentesting
Apple Inc., the largest consumer electronics manufacturers in the world...
23 March 2021
Read More