BURP Suite Macros: A Hands-On Guide

BURP Suite Macros: A Hands-On Guide

Introduction Fed up being slowed down by simple checks and functionality? Even seemingly simple CSRF tokens can get in the way of a straight-forward brute-force attack! Enter BURP Suite Macros, an indispensable tool that can be used to efficiently handle these...
Safe Browsing: Essential Practices

Safe Browsing: Essential Practices

Overview TCM is thrilled to continue the, “Practical Cybersecurity Awareness” blogs this week during Cybersecurity Awareness Month. The four topics discussed throughout the month of October will be compiled into a free course at TCM Academy available on...
Docker for Web App Pentesters

Docker for Web App Pentesters

Overview Having a flexible and isolated environment doesn’t just save us time, it can also be crucial for testing. Whether you’re deploying a real-world application stack for research, testing exploits, or setting up vulnerable apps for practice, you need a...
Three Ways to Write More Secure Code

Three Ways to Write More Secure Code

Overview With application security being a critical component of most organizations defenses, development teams must be proactive to safeguard their applications. This article delves into three fundamental practices to enhance security: viewing every user through a...