October 7, 2019

A run-time approach for penetration testing of iOS apps Part-I

Hello everybody, This article will cover dynamic run-time penetration testing of iOS applications or iOS pentesting, making use of the Objection framework or systems. An iOS […]
July 16, 2019

XSS Auditor no more part of Google Chrome

Yes, you heard correct Google Chromium devs announced the news about XSS auditor. The XSS auditor time and again bypassed by the client security researcher to […]
July 7, 2019
SecureLayer7 at RISE Conference

SecureLayer7 at RISE Conference, Hong Kong 2019

RISE Conference Hong Kong 2019 is Asia’s largest tech conference, and SecureLayer7 is selected in the Alpha program. At SecureLayer7, we decided to release our signature […]
April 20, 2019

Exploring, Exploiting Active Directory Pen Test

Active Directory (Pen Test ) is most commonly used in the Enterprise Infrastructure to manage 1000’s of computers in the organization with a single point of […]
January 8, 2019

Gratis Winter Pen Test 2019 Program

Overview : Free Penetration Testing For Open Source Application. We love to help to secure Open Source application and that’s a primary reason every year we […]
December 12, 2018

My Six Months Journey in SecureLayer7

Before I step into the new year, I would like to share about my delightful journey in SecureLayer7, in short SecureLayer7 Review. Six months back, I […]
December 12, 2018

SecureLayer7 at Japan’s Code Blue International Conference, Nov 2018.

Hey there, I wanted to talk about my experience at SecureLayer7 at Japan’s Code Blue International Conference, Nov 2018. I’m a Security Consultant at SecureLayer7 who […]
July 23, 2018

Abusing SUDO Advance for Linux Privilege Escalation – RedTeam Tips

Abusing SUDO Advance for Linux Privilege Escalation If you have a limited shell that has access to some programs using thesudocommand you might be able to […]
December 18, 2017
Fileless malware

Fileless malware- the ninja technique to spread malwares using default os tools

What are fileless malwares? Fileless malware are not typical malwares that probe directly or indirectly to install software on a victim’s machine and then execute. Instead, […]
Enable Notifications    OK No thanks