0161 513 0960
Services
Penetration Testing
Infrastructure Penetration Testing
Web Application Penetration Testing
Mobile Application Security Testing
Vulnerability Scanning
Wireless Penetration Testing
Security Training
Hacking and Defending Networks
Hacking and Defending Web Apps
Security Awareness Training
Consultancy
Virtual Information Security Manager
Cyber Security Maturity Assessment
Incident Response Scenario Testing
Cloud Configuration Security Review
Firewall Configuration Security Review
Build Configuration Security Review
Threat Modelling
IoT Cyber Scheme
Cyber Essentials & Cyber Essentials Plus
Resources
Blog
News
Our Events
Secarma Labs
Archive
About Us
Contact
Bypassing Windows Defender with Environmental Decryption Keys
Process Injection Part 2: Modern Process Injection
Process Injection Part 1: The Theory
Three ways of using MSBuild to beat CrowdStrike
Understanding Common SSL/TLS Misconfigurations
Testing Compiled Applications
Chaining Vulnerabilities for Account Takeover
Bypassing Android’s RootBeer Library (Part 2)
Using Visual Studio Code Extensions for Persistence
Escaping Restricted Shell through Insecure Consul API