• Follow
  • Follow
  • Follow
  • Follow
  • Follow
Twelvesec
BLOG
  • SERVICES
    • CYBER ASSURANCE
    • SECURITY MANAGEMENT
    • INCIDENT HANDLING & RESPONSE
    • SECURITY TRAINING
    • SECURE SDLC
  • SECTORS
  • TOOLS
  • BLOG
  • ABOUT US
    • ΤWELVESEC
    • CLIENTS
    • HEADQUARTERS
    • CAREERS
    • NEWS
  • SERVICES
    • CYBER ASSURANCE
    • SECURITY MANAGEMENT
    • INCIDENT HANDLING & RESPONSE
    • SECURITY TRAINING
    • SECURE SDLC
  • SECTORS
    • Aerospace
    • Automotive
    • Defence
    • Finance
    • Healthcare
    • Law enforcement & Security agencies
    • Manufacturing
    • Maritime
    • Public sector
    • Rail
    • Retail
    • Software development
    • Telecommunications
    • Tourism
  • TOOLS
  • BLOG
  • ABOUT US
    • Twelvesec
    • Clients
    • Life @ Twelvesec
    • Careers
    • News
    • Contact
GasMask – TwelveSec’s new Open Source tool for OSINT

GasMask – TwelveSec’s new Open Source tool for OSINT

by George Karpouzas | Feb 14, 2018 | 2 comments

  GasMask strives to be an all-in-one Information Gathering (OSINT) tool.   It is an Open-Source Intelligence (OSINT) tool that helps you effectively gather information from publicly available sources. GasMask is useful for Penetration Testers and Red Teams...
Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security

Greek Cyber Security Challenge 2016 write-ups part 7: J-Android-Mobile Security

by christina | Oct 26, 2017 | 0 comments

Category: Mobile Security You can download the Mobile Security Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be found here....
Greek Cyber Security Challenge 2016 write-ups part 6: Ailianos VM-Reverse Engineering

Greek Cyber Security Challenge 2016 write-ups part 6: Ailianos VM-Reverse Engineering

by Fotios Ailianos | Oct 16, 2017 | 0 comments

Category: Reverse Engineering You can download the Stack VM-Reverse Engineering Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be...
Greek Cyber Security Challenge 2016 write-ups part 5: Nasos Web

Greek Cyber Security Challenge 2016 write-ups part 5: Nasos Web

by Athan Georgopoulos | Oct 5, 2017 | 0 comments

Category: Web security You can download the Web Security Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be found here. Points: 60...
Greek Cyber Security Challenge 2016 write-ups part 4: Gavrila Crypto

Greek Cyber Security Challenge 2016 write-ups part 4: Gavrila Crypto

by Athan Georgopoulos | Sep 26, 2017 | 0 comments

  Category: Cryptography, Steganography You can download the Cryptography Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be...
Greek Cyber Security Challenge 2016 Writeups part 3: Panos Memdump-Digital Forensics

Greek Cyber Security Challenge 2016 Writeups part 3: Panos Memdump-Digital Forensics

by Athan Georgopoulos | Sep 12, 2017 | 0 comments

Category: Digital Forensics You can download the Memdump-Digital Forensics Challenge, along with all the challenges for the 2016 Greek Qualifier CTF of European Cybersecurity Challenge, in this link. More details on the Greek ECSC 2016 Qualifier CTF event can be found...
Page 8 of 11« First«...234567891011»

LATEST POSTS

  • RCE Via Arbitrary File Upload at Open eClass January 16, 2026
  • BoFs Are Not Dead January 14, 2026
  • Is user training a good thing? December 9, 2025
  • The three vectors of a pentest engagement. November 14, 2025
  • Securing the Smart Future – Why IoT & Hardware Penetration Testing Is No Longer Optional October 17, 2025
  • Red Teaming: The Art of Adversarial Simulation August 19, 2025
  • Threat Led Penetration Testing: Simulating Tomorrow’s Attacks, Today July 11, 2025

TAGS

Athens Architecture Review 0day android Android App Reversing 13033 airlines Application Source Code Review 0-day ADSL apk 0-days APPI adb Apple Application Penetration Test ALPHA BANK Aerospace ALDI Android Security

ΝΟΤΕ

* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.

STAY CONNECTED

[email protected]

+30 211 182 21 58

LEGAL

  • DATA PROTECTION POLICY
  • TERMS & CONDITIONS

NAVIGATE

  • CONTACT
  • BLOG
  • CAREERS
Copyright 2025 Twelvesec | Created by Amiad