top of page
BLOG
Search


Untangling - IAM Policy, S3 Bucket Policy & S3 ACL
Most of the time, analyzing security through AWS policies resembles this diagram for me: Untangling who is holding which kite! AWS...
Jan 4, 20224 min read

Basics of Network & NMAP
Hi there! How are you doing? More on, how is your internet doing? What about LAN? Are you exchanging traffic with domains you'd not want...
Dec 19, 20208 min read


I automated my Whatsapp Chats!
Android Accessibility Service to alter the way you use your mobile I am a big fan of automation. Honestly, in this era of the attention...
Dec 5, 20202 min read


#android | It's in your memory!
Memory forensics in Android The numerous fascinating concepts I have learned in past several weeks, needed to be captured. One of them...
Oct 18, 20203 min read

#android | Understanding Android to bits and bytes
[Part 1] I wanted to write Understanding Android to 'bits and pieces' but this sounds more relevant. So what's this post about? Often...
Oct 18, 20204 min read


#android | Would you notice if you are hacked this way?
Android Security [Disclaimer: Only for educational purposes] Hola, In this post we are going to talk about an interesting vulnerability...
Oct 18, 20203 min read

#android | VOLD-emort killed my App
I have been playing around Android OS for a while and this post is one of the learnings I wanted to share. The misleading yet catchy...
Oct 18, 20203 min read

#android | Is your app authentic?
Have a good look at the apps you have on your Android phone. How do you ensure all of them are authentic? E.g. how can you make sure that...
Oct 18, 20204 min read

#android | Security Tips every developer needs to know!
The role of a developer in getting rid of security vulnerabilities at it's very inception is significant! In my opinion, it's the mindset...
Oct 18, 20204 min read
bottom of page