About Us
Services
Penetration Testing Services
API penetration testing
Cloud security testing
Container security testing
Internal network pentest
External network pentest
IoT pentest
Mobile application pentest
Web application pentest
AI and LLM pentest
Secure Software Development
Threat modeling for agile teams
Managed application security
DevSecOps consulting
Security Compliance
ISO27001 guided implementation
SOC 2 guided implementation
TISAX guided implementation
Career
Blog
Contact us
Home
Post Types
Article
Understanding ConfuserEx2: .NET Obfuscation and Deobfuscation Techniques
All Posts
Article
Case Studies
All Categories
AppSec
Company updates
Compliance
Howto
Security Research
Uncategorized
Vulnerabilities
Howto
Understanding ConfuserEx2: .NET Obfuscation and Deobfuscation Techniques
by Olga Kovalenko
March 18, 2025
8
min read
Read more
AppSec
Securing Android Apps: Guide to Android App Security
by Olga Kovalenko
February 25, 2025
9
min read
Read more
Howto
Penetration Testing Checklist: How to Prepare for a Penetration Test
by Olga Kovalenko
January 17, 2025
6
min read
Read more
AppSec
Mobile Application Penetration Testing: Complete Guide & Best Practices
by Olga Kovalenko
November 11, 2024
10
min read
Read more
Howto
Red Team vs. Blue Team: How They Help Each Other
by Olga Kovalenko
October 31, 2024
9
min read
Read more
AppSec
White Box, Gray Box, and Black Box Penetration Testing: Complete Guide
by Olga Kovalenko
October 24, 2024
7
min read
Read more
Howto
Network Penetration Testing: All You Need to Know
by Olga Kovalenko
October 17, 2024
9
min read
Read more
AppSec
OWASP Mobile Top 10 Vulnerabilities And How To Prevent Them
by Olga Kovalenko
September 19, 2024
8
min read
Read more
AppSec
Common Web Application Vulnerabilities and How to Prevent Them
by Olga Kovalenko
September 11, 2024
9
min read
Read more
Posts navigation
1
2
3
Close
Contact Form