Exploring and Modifying Android and Java Applications for Security Research

Sometimes pentesters and security researchers need to modify existing Java application but have no access to its source. For example, it might be necessary to adjust the logic a bit to see how the application works in certain specific conditions….
Continue reading Exploring and Modifying Android and Java Applications for Security Research

Posted in Uncategorized

Hacker’s Wish Come True After Infecting Visitors of Make-A-Wish Website With Cryptojacking

Hacker’s Wish Come True After Infecting Visitors of Make-A-Wish Website With Cryptojacking After coming back from a vacation, the first thing to do is catch up with what happened while you were gone. That is what I did earlier this…
Continue reading Hacker’s Wish Come True After Infecting Visitors of Make-A-Wish Website With Cryptojacking

Posted in Uncategorized