0161 513 0960
Services
Penetration Testing
Infrastructure Penetration Testing
Web Application Penetration Testing
Mobile Application Security Testing
Vulnerability Scanning
Wireless Penetration Testing
Security Training
Hacking and Defending Networks
Hacking and Defending Web Apps
Security Awareness Training
Consultancy
Cyber Essentials & Cyber Essentials Plus
Virtual Information Security Manager
Cyber Security Maturity Assessment
Incident Response Scenario Testing
Cloud Configuration Security Review
Firewall Configuration Security Review
Build Configuration Security Review
Threat Modelling
IoT Cyber Scheme
Partnership
Partnership Service
Resources
Blog
News
Our Events
Secarma Labs
Archive
About Us
Contact
ExploitDev: WOOCOMMERCE PHP Object Injection
Using NetBeans GUI Designer to Make Pretty Burp Extenders
Using Machine Account Passwords During an Engagement
Uploading Files to RDP, NVC, or Anywhere You Can Type
SSRS Attacks Part 2 – Building an Empire
SSRS Attacks Part 1 – Dynamic Data Extraction
SoHopelessly Broken 0-day Strategy
Setting Service Principal Names to Roast Accounts
Pandwarf in a KALI VM on a Windows Host
Is Dynamic Data Exchange (DDE) Injection a Thing?
In (Zero) Days Gone By – Part 1 – Magento Unauthenticated SQLI (CVE-2011-4781)
INDUSTROYERS
1
2
>