Training Stay Home Offensive Security Mobile Device Security
On Wednesday 15 April 2020, we are organizing a special training session dedicated to Mobile Devices Security.
ReadMobile Device Security Secure Software Development
Usually, Android applications are written in Java (or, now, in Javascript) and compiled in a Dalvik bytecode (DEX file). Then, the bytecode is interpreted and executed by the Dalvik Virtual Machine.
ReadScanning a website is an important step of the reconnaissance phase. Different tools, like BlackWidow, can automate the process. We present here another tool that allows to scan a website without leaving traces on the target servers : waybackurls.
ReadLaravel is an extremely powerful PHP framework for building web applications, but the first steps can be quite intimidating. In this tutorial we guide you through the first steps to get you started as a breeze.
ReadOffensive Security Mobile Device Security
In May 2019, Google announced there are 2.5 billion active Android devices. Thereby, most companies develop their own application. Not only the richest companies like Google, Facebook, Amazon,... but also a lot of smaller businesses.
ReadPHP GitLab Secure Software Development
In the PHP toolbox for testing, you'll often find phpunit for unit testing, PHP_CodeSniffer for code style analysis, and here we present PHPStan for static code analysis.
ReadBlackWidow is a python script that automatically crawls a website to gather information like phone numbers, email addresses, form URL's etc. Very useful during the reconnaissance phase!
ReadToday we released version 0.0.28 of our Multi-Agent Ranking Framework (MARK).
ReadphpVirtualBox is a well known web interface for managing virtual machines. There is however another less known library that allows to manage virtual machines from your own PHP applications : php-vbox-api. The API allows you to do stuff like:
ReadIn Laravel, a Middleware is basically a piece of code that should be executed for every http request. Middlewares are typically used to:
ReadToday we are presenting distributed k nearest neighbors (k-nn) graphs and similarity search algorithms at the ULB.
Read