Radare2 – Reverse Engineering Tools

For those who have experience in with Reverse Engineering Method, they should be familiar with Radare2 Tools where it will provide a set of libraries and also work with binary files. Radare2 or also known […]

Buffer Overflow Masterclass

For starter, Buffer Overflow only occurs when the program has attempted to write more data into the fixed block of memory. The attacker will send crafted data to the memory and executed the arbitrary code […]

Riltok Trojan

Kaspersky researchers did found a money-stealing mobile malware where it can launch new variants of malware to the smartphone device The malware have extend their target to Europe from Russia.  The Riltok have first discovered […]

BlueKeep Ticking bomb

Bluekeep or also called CVE-2019-0708 is a vulnerability that related to critical remote code execution bug which found in older and legacy version of Windows such as Windows 7 and older. The vulnerabilities could give […]

Amcrest Security Camera Vulnerability

As been wrote at ThreatPost, there is around six vulnerability have been found in Amcrest Security Camera by Mandar Satam, a senior security researcher at Synopsys as follows: CVE-2017-8226 CVE-2017-8227 CVE-2017-8228 CVE-2017-8229 (Serious Bug) CVE-2017-8230 […]


What is Exiftool? Exiftool is an open source tool that read, write and edit any meta related to Jpeg, Pdf, Audio, and Video. The purpose of Exiftool is that differentiation between original file with the […]

Web Application assessment tools

When we talk about Web Application assessment tools, most of us will think about Acunetix, and Nikto where it can be consider as popular nowdays. Web Application Assessment approach is to scan the website either […]

SAP Penetration Testing MasterClass

What is SAP? SAP also known as Systems, Application and Products in Data Processing owned by German company that have devoted to the business solutions development. More than 41,600 customers in more than 120 countries […]


What is DNSTwist? DNStwist is a tools where it will generate a list of any possible phishing domains and verify whether the phishing domain have been registered.   Main Function of DNStwist Below are the features […]

Secure Coding Tutorial

Secure Coding What is is Secure Coding? Secure coding is a method where the developer will securing the code from been compromised by the attacker. The best practice for this method is the developer need […]