Gender Equality in The Workplace | qSEAp

For any successful business, creating a fair and equitable workplace is essential. 

22 February 2023

Read More

Linux Privilege Escalation

Hello people this write-up is about how to escalate privilege in Linux.

11 November 2022

Read More

SSTI (Server Side Template Injection)

 

Server side Template Injection or SSTI occurs when an attacker provides a malicious input to the application template which leads to executing commands on the server side.

26 August 2022

Read More

Access personal system through RDP from anywhere via OpenVPN Cloud

So, this write-up is all about accessing your home system via RDP from
anywhere through OpenVPN connection.

11 July 2022

Read More

How to Access a LAN resource over the Internet?

It is quite fascinating to know what we can do with the help of internet.

17 December 2021

Read More

SSL Certificate Pinning Bypass – The Manual Approach!

SSL Certificate pinning is a process where an application on the ...

02 April 2021

Read More

Managing Cyber-Attacks in a time of Pandemic

Do you think this pandemic can extend for a period of 6 months , 1 Year or 2 Years ? No Idea.

10 May 2021

Read More

Hacking Json Web Token

According to official website, JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained …

24 December 2020

Read More

Root Detection and SSL Pinning Bypass Using Xposed Framework

Root-detection process is used in Android to prevent users from using their app on a rooted device…

24 December 2020

Read More

iOS Application Security Testing & Pentesting

Apple Inc., the largest consumer electronics manufacturers in the world...

23 March 2021

Read More

Enquire Now

Stay up to date with the latest news!