Gender Equality in the workplace | qSEAp
For any successful business, creating a fair and equitable workplace is essential.
22 February 2023
Read More
Access personal system through RDP from anywhere via OpenVPN Cloud
So, this write-up is all about accessing your home system via RDP from
anywhere through OpenVPN connection.

11 July 2022

Read More
Managing Cyber-Attacks in a time of Pandemic
Do you think this pandemic can extend for a period of 6 months , 1 Year or 2 Years ? No Idea.

10 May 2021

Read More
Linux Privilege Escalation
Hello people this write-up is about how to escalate privilege in Linux.
11 November 2022
Read More
How to Access a LAN resource over the Internet?
It is quite fascinating to know what we can do with the help of internet.
17 December 2021
Read More
Hacking Json Web Token
According to official website, JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object.
24 December 2020
Read More
iOS Application Security Testing & Pentesting
Apple Inc., the largest consumer electronics manufacturers in the world...
23 March 2021
Read More
SSTI (Server Side Template Injection)
Server side Template Injection or SSTI occurs when an attacker provides a malicious input to the application template which leads to executing commands on the server side.

26 August 2022

Read More
SSL Certificate Pinning Bypass – The Manual Approach!
SSL Certificate pinning is a process where an application on the client-side is coded to connect over an encrypted connection to only those HTTP servers which has the correct certificate.

02 April 2021

Read More
Root Detection and SSL Pinning Bypass Using Xposed Framework
Root-detection process is used in Android to prevent users from using their app on a rooted device

24 December 2020

Read More