VS-Labs
![Part 6: Comprehensive Research of Linux Operating System](https://versprite.com/wp-content/uploads/2022/06/Research-of-The-Linux-1-1024x576.png)
Application Security, Security Research
Part 6: Comprehensive Research of Linux Operating System
![Part 5: Comprehensive Research of Linux Operating System](https://versprite.com/wp-content/uploads/2022/06/Linux-Operating-System-1024x576.png)
Application Security, Security Research
Part 5: Comprehensive Research of Linux Operating System
![Part 4: Comprehensive Research of Linux Operating System](https://versprite.com/wp-content/uploads/2022/05/Linux-System-1024x576.png)
Application Security, Security Research
Part 4: Comprehensive Research of Linux Operating System
![Part 3: Comprehensive Research of Linux Operating System](https://versprite.com/wp-content/uploads/2022/05/Linux-vulnerabilities-1024x576.png)
Application Security, Security Research
Part 3: Comprehensive Research of Linux Operating System
![Part 2: Comprehensive Research of Linux Operating System](https://versprite.com/wp-content/uploads/2022/05/linux-device-drivers-1024x576.png)
Application Security, Security Research
Part 2: Comprehensive Research of Linux Operating System
![Comprehensive Research of Linux Operating System](https://versprite.com/wp-content/uploads/2022/05/Linux-Operating-System-1-1024x576.png)
Application Security, Security Research
Comprehensive Research of Linux Operating System
![Utilizing Reverse Proxies to Inject Malicious Code & Extract Sensitive Information](https://versprite.com/wp-content/uploads/2019/10/Reverse-Proxy-phishing-1024x576.png)
Application Security, Security Research
Utilizing Reverse Proxies to Inject Malicious Code & Extract Sensitive Information
![Waves Maxx Audio DLL Side-Loading LPE via Windows Registry](https://versprite.com/wp-content/uploads/2019/07/Windows-Registry-1024x576.png)
Application Security, Security Research
Waves Maxx Audio DLL Side-Loading LPE via Windows Registry
![Exploiting the Dolphin Browser for Android’s Backup & Restore Feature](https://versprite.com/wp-content/uploads/2023/01/dead-dolphin-1024x729.jpg)
Application Security, Mobile Security Testing, Security Research
Exploiting the Dolphin Browser for Android’s Backup & Restore Feature
![Shellcoding an Arm64 In-Memory Reverse TCP Shell with Frida](https://versprite.com/wp-content/uploads/2023/01/reverse_shell.jpg)
Application Security, Mobile Security Testing, Security Research
Shellcoding an Arm64 In-Memory Reverse TCP Shell with Frida
![Frida Engage Part One | Building an ELF Parser with Frida](https://versprite.com/wp-content/uploads/2023/01/FRIDA-ENGAGE-PART-ONE-AND-PART-TWO-1024x646.jpg)
Application Security, Mobile Security Testing, Security Research
Frida Engage Part One | Building an ELF Parser with Frida
![Into the Jar | Jsonpickle Exploitation](https://versprite.com/wp-content/uploads/2023/01/jsonpickle.jpg)
Application Security, Security Research
Into the Jar | Jsonpickle Exploitation
![Android Titan SMS Trojan Analysis | Part One](https://versprite.com/wp-content/uploads/2023/01/android-titan-sms-trojan-1024x683.jpeg)
Application Security, Mobile Security Testing, Security Research
Android Titan SMS Trojan Analysis | Part One
![Multiple Vulnerabilities in Mercury Browser for Android Version 2.2.2 & 3.0.0](https://versprite.com/wp-content/uploads/2023/01/mercury-browser-1024x683.jpeg)
Application Security, Mobile Security Testing, Security Research
Multiple Vulnerabilities in Mercury Browser for Android Version 2.2.2 & 3.0.0
![Android InfoStealer – Godwon – Analysis](https://versprite.com/wp-content/uploads/2023/01/android-infostealer-godwon-1024x683.jpeg)
Application Security, Mobile Security Testing, Security Research