JS malware. How Chrome helped me reverse a ransomware virus You've probably
received an email with a link to a suspicious archive at least once. The authors of such emails do everything possible to make an inattentive user follow the link and let them infect their computer. A similar letter...
CC mining using Magento as an example
In this article, I will describe one of the working options for CC mining using brute using the AccessBomber application as an example. You can choose not to use this application, but use other free/paid alternatives.
So, initial conditions. We have...
DDOS By H3llSh3ll
THIS MANUAL IS PROVIDED FOR INFORMATION ONLY. THE AUTHOR DOES NOT CALL READERS TO ILLEGAL ACTIONS.
I urge you not to attack government resources and large companies, especially banks.
Commercial organizations do not forgive this, they bite hard in court.
Otherwise, a...
Application attack. Using Xposed to bypass SSLPinning on Android
There are different approaches to analyzing the security of applications, but sooner or later everything comes down to studying the interaction of the program with the API. It is this stage that provides the most information about...
In this article I will talk about most public methods.
To make it easier, we will divide this article into 3 parts, the first will tell you how to do it using MySql, the second through Apache logs and the third through public bugs.
Hidden content