Snapsec
  • Home
  • Live Demo
Sign in Subscribe

Latest

From-Detection to Resolution

From-Detection to Resolution

Vulnerabilities are inevitable in today's digital landscape, making effective vulnerability management a critical aspect of maintaining a secure environment. From the moment a vulnerability is detected to its successful resolution, organizations need a streamlined process that ensures swift and thorough action. In this article, we'll guide

08 Sep 2025
Our Pentesting Methodology

Our Pentesting Methodology

As a cybersecurity and penetration testing company, it is important for us to have a clear and thorough methodology in place to ensure the effectiveness and reliability of our services. In this article, we will discuss our approach to penetration testing and the tools and techniques we use to identify

06 Sep 2025
We Hacked Larksuite For 1 month and Here is what we found

appsec

We Hacked Larksuite For 1 month and Here is what we found

Back in March 2020 shuffling our private invites stock to crash into a program worthy of our time and excitement. In a while, we stumbled upon a program by name of Lark Technologies. Larksuite is a collaborrative platform where users can collaborate on various tasks. This product comprised of various

24 Nov 2024
Attacking 2FA in Modern Web Apps

Research

Attacking 2FA in Modern Web Apps

You might be familiar with the annoying OTPS or other authentication tokens delivered right after you log into your favorite site. This article will help you to understand the purpose of 2FA and its exploitation. I have also drafted some of the 2FA bypasses you can use these techniques to

07 Sep 2024
See all
Snapsec
  • Sign up
Powered by Ghost

Snapsec

Modernizing Your Application Security