Physical attacks
Mobile Apps Pentesting


Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps and reading researches and news.

Here you can find a little introduction:

Here you will find the typical flow that you should follow when pentesting one or more machines.

Click in the title to start!