
Hacking
Chaining Web Proxies to overcome limitations
This article shows a practical example of what is proxy chaining in a web proxy tool and how proxy chaining can be used to overcome limitations of web proxy

Reverse engineering
Unpacking, reversing, patching
This article is an introduction of packing, how to unpack, to reverse an exe and finally patching it. I have chosen to show reversing of a sample exe file an

Secure coding
Secure code review: A practical approach
This article is about different code review techniques and their application in the real world What you will learn What is secure code review and how to

Application security
Android Application Assessment
In this article, we'll discuss THE steps involved in performing A security assessment of an Android based application. We will see the use of various tools a

Hacking
Arbitrary file download: Breaking into the system
What you will learn: Introduction to Arbitrary File Download [pkadzone zone="main_top"] Difference between Arbitrary File Download and LFI/ RFI H