Penetration Testing

May 4, 2021
android-static-analysis

OWASP Top 10: Static Analysis of Android Application & Tools Used

Static analysis is the exploitation of strategies that parse the program source code or bytecode, regularly navigating program routes to check the program properties. Static analysis […]
April 15, 2021
waf

What is WAF? How Web Application Firewall Evasion Techniques Work?

What is WAF? A web application firewall is a specific kind of application firewall that applies explicitly to web applications. It is released before web applications […]
March 30, 2021
powershell

PowerShell for Pentest- Examples of Commands, Scripts for Pentesters

Over the last decade, Powershell is now used to do everything on a Windows platform and we as pentesters can also utilize it as a powerful […]
March 17, 2021
OSINT tool

OSINT tools, much more than Open Source and Intelligence – Part I

OSINT is the combination of OS(Open-Source) and INT(Intelligence) or information. OSINT is quite a crucial element in keeping tabs on the information chaos. When you talk […]
March 9, 2021
Web Application Security

Web Application Security Automation is of Utmost Importance in 2021

In these modern times, with almost everything going “Online”, Cyber Security is the prime importance leading 2021. And along with that, the fast-paced nature of everything […]
January 10, 2021
CSV Injection and CSV Excel Macro Injection

Everything about CSV Injection and CSV Excel Macro Injection

CSV Excel Macro Injection, also known as Formula Injection or  CSV Injection, is an attack technique that we use in the day-to-day penetration testing of the […]
December 21, 2020

CREST Accredited Company a new stature for SecureLayer7

SecureLayer7, to become a member of the CREST accredited has passed the requesting appraisal needed to turn into an individual from CREST, the not-revenue driven accreditation […]
October 28, 2020

OWASP Top 10 Web Application Security Risks: SQL Injection

Injection. What is Injection? Injection in simple terms means supplying an untrusted input in the application. This untrusted input then gets interpreted by the interpreter considering […]
October 9, 2020

Top Security Practices To Make Agile Development More Agile

Programming improvement or software development groups have been changed altogether to adapt to the ever-advancing programming or software markets. The always competitive market has particularly pushed […]
Enable Notifications    OK No thanks