Articles by Author

In 5 steps, I will show you how to find a remote code execution vulnerability in an unreleased version of the  German Covid-19 tracing app (CWA), using feedback-based fuzz testing.

Let’s say you conduct a penetration test on a web application, and you find zero critical...

Subscribe to our Newsletter!