Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • Contact
  • About

Tag: Exploit-DB

Identifying vulnerabilities and potential victims

September 1, 2021 imorosan

Introduction Nowadays, the cybersecurity field is becoming more and more important in everyday life as technologies evolve continuously and more malicious people, so-called hackers, want

Continue reading

Top Posts

  • Root detection and SSL pinning bypass
  • Practical JSONP Injection
  • IoT Pentesting 101: How to Hack MQTT - The Standard for IoT Messaging
  • Introduction to Windows shellcode development - Part 1
  • Pentesting Azure: RECON Techniques

Blog Stats

  • 256,585 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 96 other followers

Categories

  • Active Directory (1)
  • Announcements (1)
  • Conferences (3)
  • Embedded systems security (2)
    • IoT Pentesting (1)
  • Ethical Hacking (8)
  • General security (9)
  • IT Security Assurance (1)
  • IT Security Audit (1)
  • Metasploit (1)
  • Misc (15)
    • Code Review (1)
  • Mobile security (4)
  • Network security (3)
  • Operating systems (1)
  • Penetration Testing (11)
  • Pentest techniques (19)
  • Web security (10)
Blog at WordPress.com.
  • Follow Following
    • Security Café
    • Join 96 other followers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar