Harness the woolly beast! Identifying critical data in code with Llama

Date: 04/08/2025

This article discusses three topics: (1) why should AppSec engineers closely monitor sensitive data contained in their products; (2) how to extract the structure of transmitted data from the service code; and (3) how to assess severity for particular fields in found objects in accordance with predefined rules (or how to ask a local open-source LLM model to assess such data for you).
Read full article →


Assembly Programming for Beginners

Date: 26/07/2025

What is programming in its essence, independent of any specific language? The variety of answers is astounding. The most common definition you’ll hear is that programming is the creation of instructions or commands for a machine to sequentially execute in order to solve a particular problem.
Read full article →


Multistep SQL injection attacks: Operating principle and impact

Date: 13/06/2025

SQL injections (SQLi) are among the most popular vulnerabilities in the pentesting community. Too bad, such attacks are increasingly rare nowadays since modern security tools easily detect them. By contrast, an injection triggered when data transfer occurs between services is much more difficult to detect. This article discusses SQLi that are triggered not immediately, but somewhere in the middle of business logic.
Read full article →