About Us
Services
Penetration Testing Services
API penetration testing
Cloud security testing
Container security testing
Internal network pentest
External network pentest
IoT pentest
Mobile application pentest
Web application pentest
AI and LLM pentest
Secure Software Development
Threat modeling for agile teams
Managed application security
DevSecOps consulting
Security Compliance
ISO27001 guided implementation
SOC 2 guided implementation
TISAX guided implementation
Career
Blog
Contact us
Home
Howto
Understanding ConfuserEx2: .NET Obfuscation and Deobfuscation Techniques
All Posts
Article
Case Studies
All Categories
AppSec
Company updates
Compliance
Howto
Security Research
Uncategorized
Vulnerabilities
Howto
Understanding ConfuserEx2: .NET Obfuscation and Deobfuscation Techniques
by Olga Kovalenko
March 18, 2025
8
min read
Read more
Howto
Penetration Testing Checklist: How to Prepare for a Penetration Test
by Olga Kovalenko
January 17, 2025
6
min read
Read more
Howto
Red Team vs. Blue Team: How They Help Each Other
by Olga Kovalenko
October 31, 2024
9
min read
Read more
Howto
Network Penetration Testing: All You Need to Know
by Olga Kovalenko
October 17, 2024
9
min read
Read more
Howto
What Is API Security? Complete Guide & Best Practices
by Igor Kantor
September 5, 2024
10
min read
Read more
Howto
Top Container Security Vulnerabilities and How to Solve Them
by Igor Kantor
July 26, 2024
8
min read
Read more
Howto
Main Cloud Security Challenges and How to Solve Them
by Igor Kantor
July 19, 2024
12
min read
Read more
Close
Contact Form