This website uses cookies for security purposes only. We do not track you or see your data.
Intro This is the second post of a blog series following my progress with the “Practical Reverse Engineering: x86, x64,…
Intro This is the first post of what should be a blog series following my progress with the “Practical Reverse…
19 May Update I have improved a bit the host representation. Digging into d3 capabilities found several very useful capabilities…
Your external security consultant just sent you the vulnerability report from the last test you ordered? What shall you do…
I am sorry but this is not a security related blog post. However I still consider some workarounds as “life…
I have always admired people that could represent complex ideas in a simple way or have come up with ideas…
This is just a list with applicaitons and frameworks out there that could be used to test your web application…
This post is more to document my own “discovery” and not to get into the loop of researching the same…
I have been thinking a lot about the fact that the panetesting, sourco code reviews and all those security assurance…
Couple of days ago a colleague of mine (thanks DL) got my attention with a lovely web server access log…