attack and pentest

Using SecLists for Penetration Testing

Introduction to SecLists Seclists is something that comes very handy to a pen tester. The simple reason is, it has…

2 years ago

Case Study – New way to Exploit Java Deserialization Vulnerability

Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are…

6 years ago