- DLL Hjacking
- API Pentesting & Business Logic Vulnerabilities
- Hardcoded Secrets
- Unquoted Service Path
- Misconfigured File Permission
- Binary Compilation
(ASLR,DEP,SEH)
- Check Config Files
( IV + Secrets + Config Setting + Credentials)
- Memory Overwrite
- Code Obfuscation
- Application/Binary Hooking
- Misconfigured Registry Permission
- Hidden GUI Controls
- Sensitive Data Stored in Memory
- Vulnerable Dependency
- Created By: Devansh Bordia
@devansh3008