Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • Contact
  • About

Category: Code Review

Security Source Code Review – Manual Approaches

June 6, 2022 Eduard Agavriloae

Performing security source code reviews is part of the penetration tester’s life. Either that this is the whole scope of an engagement or you exfiltrated

Continue reading

Top Posts

  • Root detection and SSL pinning bypass
  • A Complete Kubernetes Config Review Methodology
  • Mobile Pentesting 101 - Bypassing Biometric Authentication
  • IoT Pentesting 101: How to Hack MQTT - The Standard for IoT Messaging
  • Practical Network Penetration Tester (PNPT): Real-life Penetration Testing exam - Tips & Tricks to pass the exam

Blog Stats

  • 297,927 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 107 other subscribers

Categories

  • Active Directory (1)
  • Announcements (2)
  • Cloud Security (7)
    • aws (5)
    • Azure (1)
  • Conferences (4)
  • Embedded systems security (2)
    • IoT Pentesting (1)
  • Ethical Hacking (10)
  • General security (11)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (14)
    • Code Review (1)
  • Mobile security (5)
  • Network security (4)
  • Operating systems (1)
  • Penetration Testing (15)
  • Pentest techniques (21)
  • Web security (10)
Blog at WordPress.com.
  • Follow Following
    • Security Café
    • Join 107 other followers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar