PinnedAnkita SinhainSystem WeaknessMobSF: An Automated Mobile Security FrameworkA penetration testing framework that performs static, dynamic, and malware analysis of mobile applications (Android/iOS/Windows) using an…7 min read·Mar 19, 2022----
Ankita SinhaADFinder.exe : an Active Directory ToolWhat is AD Finder tool?6 min read·Apr 27, 2024----
Ankita SinhaPhases of Penetration TestingA penetration tester simulates an adversary who is motivated to launch an attack. Following these steps usually results in what they do:2 min read·Jun 11, 2022----
Ankita SinhaPenetration Testing & typesNow a day many websites are developed for different purposes and functionality. And it’s hard to give any proper statistics on the number…6 min read·Jun 1, 2022----
Ankita SinhaNumber Theory in CryptographyInsecurity applications like authentication, cryptography, etc number theory play a vital role. Cryptography is nowadays needed everywhere…5 min read·Apr 9, 2022----
Ankita SinhaWhat are Zero-Knowledge Techniques and Zero-Knowledge Proofs (ZKPs)To preserve user privacy and guarantee data confidentiality on a network, it is crucial to secure communication between the mobile devices…14 min read·Apr 2, 2022----
Ankita SinhainSystem WeaknessWeb Application Testing with NMAP & OWASP ZAPOverview7 min read·Mar 26, 2022----
Ankita SinhaDNSenum: A command-line Information Gathering ToolDNSenum is a command-line tool that automatically identifies essential DNS records such as MX, mail exchange servers, NS, domain name…5 min read·Mar 12, 2022--1--1
Ankita SinhainSystem WeaknessGoogle Dork: An Information Gathering methodGoogle Dork queries, or just dorks, are searching strings that include advanced search operators to find information that may not be…6 min read·Mar 5, 2022----