Advise
Virtual Information Security Manager
Cyber Security Maturity Assessment
Incident Response Exercising
Threat Modelling
Privacy Management Maturity Assessment
Phishing Assessments
Supplier Reviews
ISO27001 Gap Analysis
Certify
Cyber Essentials & Cyber Essentials Plus
IOT Cyber Scheme
IASME Cyber Assurance (ICA)
Security Awareness Training
Secarma Certified
Test
Web Application Penetration Testing
Mobile Application Penetration Testing
Infrastructure Penetration Testing
Wireless Penetration Testing
Cloud Penetration Testing
Build Configuration Security Review
Cloud Configuration Security Review
Firewall Configuration Security Review
Vulnerability Scanning
Red Teaming
Resources
Secarma Labs
Industry News
Blogs
Videos
Downloads
Events
IOT and PSTI
Archive
About
Our Company
ACT Framework
Partner with Secarma
Accreditations
Careers
Log in
Get in touch
Log in
Get in touch
Secarma Labs
Blog
Videos
Downloads
Secarma Labs
Industry News
Events
May 4 2021
Bypassing Windows Defender with Environmental Decryption Keys
In our latest technical blog, Juanjo - an accomplished Security Consultant here
...
Learn more
April 26 2021
Process Injection Part 2: Modern Process Injection
In our last blog, Brandon - a member of our highly skilled Red Team here at
...
Learn more
April 19 2021
Process Injection Part 1: The Theory
Process injection is a defence evasion technique that any skilled penetration
...
Learn more
March 18 2021
Three ways of using MSBuild to beat CrowdStrike
In this blog, Brandon – one of our Testing Consultants here at Secarma and an
...
Learn more
February 1 2021
Understanding Common SSL/TLS Misconfigurations
In this blog, Thomas – one of our Testing Team Leads here at Secarma – takes
...
Learn more
January 21 2021
Testing Compiled Applications
In this blog, Joe – one of our Testing Team Leads here at Secarma – takes you
...
Learn more
January 7 2021
Chaining Vulnerabilities for Account Takeover
A vulnerability scan can help you find and fix key issues within your systems -
...
Learn more
October 5 2020
Bypassing Android’s RootBeer Library (Part 2)
In the first part of this post, I discussed one method to bypass RootBeer
...
Learn more
June 30 2020
Escaping Restricted Shell through Insecure Consul API
In this blog, the Secarma Labs team provide an overview on escaping restricted
...
Learn more
July 13 2020
Using Visual Studio Code Extensions for Persistence
With Visual Studio Code being the tool of choice in most development
...
Learn more