-
Hi Team,
I was reviewing the section on "Deep links / URL schemes" at https://book.hacktricks.xyz/mobile-pentesting/android-app-pentesting/android-applications-basics and noticed a potential discre…
-
## *Hosting Request*
Use this to request hosting of an already registered lab or experiment. If the lab or experiment is not registered, please do that by raising a registration request.
#### …
-
![2023-01-21 13_09_10-CHAPTER 4_ Internet Information Gathering _ Kali Linux Penetration Testing Bible](https://user-images.githubusercontent.com/70959569/213880953-b2fed18a-fa5e-4faa-a28b-efc35535355…
-
### Describe the feature
## **Main issue:**
It's a fact, `Nuxt` / `Vue app` are leaking all application URL(s) on hydration because the full router is shipped to the client (this is by design for t…
-
Starting a new project creating penetration testing tools using Python scripts.
Links to commits can be found in this issue.
-
I have found that penetration queries seem to only sometimes work for compound shapes against compound shapes. I'm not sure what the circumstance is when they *do* work, but I have at least one test t…
-
### Description
Dynamic penetration testing of the project
Tasks
- [ ] Assess authentication
- [ ] Assess authorization
- [ ] Assess input validation
- [ ] Find logic bugs
- [ ] Denial o…
-
Establish a program for penetration tests that includes a full scope of blended attacks, such as wireless, client-based, and web application attacks.
*Measures*
```
None provided
```
*Metrics…
-
In Dragon Age poison and magical effects like Frost Weapons are counted as additional penetration or test based damage on top of the weapon's damage and likely penetrationg.
-
---
### Bug Report
> Please answer the following questions for yourself before submitting an issue.
- [x] I checked the [documentation](http://dartsim.github.io/) and found no answer.
- [x] I ch…