Menu Icon
< back to main

Pentester Guides

 • 18 min read

iOS Pentesting 101

Ninad Mathpati
Ninad Mathpati
Pentester Guides
Parameter Tampering Vulnerability Using 3 Different Approaches
 • 4 min read

Parameter Tampering Vulnerability Using 3 Different Approaches

Core Pentester Seli Feta has created a blog to help readers understand how online payments work and offer steps for learning how to execute Parameter Tampering attacks

Pentester Diaries Ep7: Tips for Communicating with Customers
 • 24 min read

Pentester Diaries Ep7: Tips for Communicating with Customers

Pentester Diaries Ep5: Understanding Severity Ratings
 • 19 min read

Pentester Diaries Ep5: Understanding Severity Ratings

Pentester Diaries Ep5: Understanding Severity Ratings

Getting Started with Android Application Security
 • 14 min read

Getting Started with Android Application Security

Getting started with Android Application Security

How to Write an Effective Pentest Report: Vulnerability Reports
 • 12 min read

How to Write an Effective Pentest Report: Vulnerability Reports

How to Write an Effective Pentest Report: Vulnerability Reports

Pentester Diaries Ep6: The Importance of Report Writing
 • 28 min read

Pentester Diaries Ep6: The Importance of Report Writing

From CSRF and File Upload to RCE - JAVA
 • 9 min read

From CSRF and File Upload to RCE - JAVA

Lukasz shares valuable learnings around how a pentester can turn a CSRF and file upload into a Remote Code Execution.

Pentester GuidesCobalt Core

Never miss a story

Stay updated about Cobalt news as it happens