Blog posts
Deep dives into vulnerabilities we discover, offensive security techniques we develop, and insights from the front lines of enterprise security research.

Credential Harvesting via Check Point SmartConsole CVE-2024-24915
CVE-2024-24915 is an insecure credential storage flaw in Check Point SmartConsole (R81.20) that leaves user credentials in plaintext memory.
Red teaming
Vulnerability research
Windows
Karol Mazurek
February 12, 2026
3
min read
•
Aug 4, 2025

Java RMI for pentesters: structure, recon and communication (non-JMX Registries).
Welcome to the comprehensive guide on Java Remote Method Invocation (RMI) tailored for penetration testers. This article aims to demystify RMI interfaces encountered during infrastructure penetration testing. Due to the depth of this topic, we’ve divided it into two parts. In this initial section, we’ll provide a concise overview of RMI interfaces, demonstrate how to create one for testing purposes, and guide you through the manual construction of an RMI Client to invoke remote methods.
Web
Infrastructure
AFINE
February 12, 2026
13
min read
•
Sep 27, 2020
.webp)
SQL Injection in the Age of ORM: Risks, Mitigations, and Best Practices
This article explains how SQL injection vulnerabilities can still occur in applications using modern ORM frameworks. It describes how to identify insecure patterns and write safer code, providing practical examples to illustrate common pitfalls and secure practices.
Secure coding
Web
Sławomir Zakrzewski
February 13, 2026
10
min read
•
Apr 28, 2025

To Allow or Not to get-task-allow: macOS Security Analysis
This article examines how the misconfigured get-task-allow entitlement in macOS apps enables code injection and TCC bypass. It builds on large-scale testing of notarized applications and highlights the risks of weakened security boundaries.
Apple
Binary exploitation
MacOS
Vulnerability research
Karol Mazurek
February 13, 2026
5
min read
•
Sep 2, 2025

Phrack Magazine: Forty Years of Hacking
From phreaking roots to cutting-edge research, Phrack has always been a space where hackers teach hackers. Forty years on, the mission hasn’t changed—it’s only grown stronger. This article dives into Phrack Magazine’s remarkable journey and its milestone 40th anniversary. From its beginnings in the 80s underground to its global presence today, we’ll look at how Phrack shaped hacker culture, what the latest issue means for the community, and how contributors—past and present—continue to keep the signal alive.
IOS
MacOS
Vulnerability research
Web
Karol Mazurek
February 12, 2026
3
min read
•
Sep 22, 2025

Desktop Application Security Standard: Introducing DASVS
Desktop application security lacked unified standards—until now. DASVS provides a structured approach to securing Windows, macOS, and Linux applications with clear verification levels and technical security controls.
Our roadmap includes the Desktop Application Security Testing Guide (DASTG) and an automated security assessment tool. Join the community and help shape the future of desktop security!
Linux
MacOS
Vulnerability research
Windows
Paweł Woyke
February 13, 2026
5
min read
•
Oct 14, 2025

Desktop Application Security Testing Checklist 2025
Are you testing desktop app security and need to know what process to follow? That’s what this desktop application security testing checklist is for. Desktop applications are fundamentally different from web and mobile apps – and those differences create unique security challenges. Web applications run mostly server-side, behind your firewalls and security controls. The browser […]
Linux
MacOS
Vulnerability research
Windows
Paweł Woyke
February 13, 2026
8
min read
•
Nov 21, 2025

Thick Client Penetration Testing Guide 2025
Thick-client penetration testing is a critical gap in most enterprise security programs. Banking software, trading platforms, healthcare systems, and manufacturing tools – these desktop applications handle your organization’s most sensitive data and critical operations. But when was the last time you actually tested their security? If you’re relying on the same penetration testing approach you […]
Linux
MacOS
Vulnerability research
Windows
Paweł Woyke
February 13, 2026
10
min read
•
Nov 23, 2025

SAP GUI Scripting with Python: Automating Security Tests Using Windows API
SAP GUI scripting automation guide: Python + Windows API for security testing. Includes practical examples of transaction validation and control extraction for penetration testers.
SAP
Vulnerability research
Windows
Michał Majchrowicz
February 12, 2026
6
min read
•
Mar 20, 2025

Invoker – Automating Pentesting Tools in Burp Suite (Example with dosfiner)
Invoker is a Burp Suite extension that automates external tools like dosfiner, sqlmap, nuclei, or ffuf, bridging the gap between captured requests and CLI commands.
Infrastructure
Linux
Vulnerability research
Web
Paweł Zdunek
February 13, 2026
7
min read
•
Mar 27, 2025
Sort by Categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Monthly Security Report
Subscribe to our Enterprise Security Report. Every month, we share what we're discovering in enterprise software, what vulnerabilities you should watch for, and the security trends we're seeing from our offensive security work.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
