top of page

Search


The Only JWT Security Guide You Will Ever Need
The Ultimate guide to Breaking JWT, JWT are primarily used for authentication & authorization almost everywhere in modern web. JWTs can possess security vulnerabilities if configured and implemented improperly, potentially causing havoc. Thus, understanding how JWTs work and how they might fail is critical when securing systems that leverage JWTs.
Sep 2417 min read
Â
Â


Demystifying Hollow Process Injection
Unlike process injection, hollow process injection suspends a legitimate process, overwrites its existing code section with malicious code,
May 1, 20246 min read
Â
Â


Deep Dive into Penetration Testing Methodologies
Penetration testing: deep diving into cybersecurity's abyss, where bugs are the new buried treasure and the sharks are wired....
Apr 11, 20243 min read
Â
Â
Blog Categories
bottom of page