<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Deep Hacking (EN)</title><description>Latest posts from Deep Hacking</description><link>https://blog.deephacking.tech/</link><language>en-US</language><lastBuildDate>Tue, 24 Mar 2026 12:52:52 GMT</lastBuildDate><ttl>60</ttl><atom:link href="https://blog.deephacking.tech/en/rss.xml" rel="self" type="application/rss+xml"/><item><title>eCPPTv3 Review - Certified Professional Penetration Tester 2026</title><link>https://blog.deephacking.tech/en/posts/ine-ecpptv3-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/ine-ecpptv3-review/</guid><description>A Comprehensive Review of INE eLearnSecurity’s eCPPTv3 Certification: Preparation, Exam, Tips, and Whether It’s Really Worth It</description><category>Certifications</category><author>Mario Ramos Salsón</author></item><item><title>eCPPTv3 Cheatsheet</title><link>https://blog.deephacking.tech/en/posts/ine-ecpptv3-cheatsheet/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/ine-ecpptv3-cheatsheet/</guid><description>A focused eCPPTv3 cheatsheet covering port enumeration, Active Directory attacks, hash dumping, and brute force techniques</description><category>Certifications</category><author>Mario Ramos Salsón</author></item><item><title>How to Submit an Article to Deep Hacking</title><link>https://blog.deephacking.tech/en/posts/how-to-submit-an-article-to-deep-hacking/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/how-to-submit-an-article-to-deep-hacking/</guid><description>Learn how to propose and submit articles to Deep Hacking, from proposal approval to the Pull Request, with a Markdown format guide and author page instructions.</description><category>Miscellaneous</category><author>Juan Antonio González Mena</author></item><item><title>How, When, and to Whom GPOs Are Applied</title><link>https://blog.deephacking.tech/en/posts/how-when-and-to-whom-gpos-are-applied/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/how-when-and-to-whom-gpos-are-applied/</guid><description>Discover how Group Policy Objects (GPO) work in Active Directory: LSDOU processing order, inheritance, security filtering, preferences, and execution context.</description><category>Active Directory</category><author>Juan Antonio González Mena</author></item><item><title>Introduction to Group Policy Objects (GPO) in Active Directory</title><link>https://blog.deephacking.tech/en/posts/introduction-to-group-policy-objects-gpo-active-directory/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/introduction-to-group-policy-objects-gpo-active-directory/</guid><description>Discover what Group Policies are in Active Directory, how GPOs work, their components (GPC and GPT), and how they enable centralized management of user and computer configurations.</description><category>Active Directory</category><author>Juan Antonio González Mena</author></item><item><title>Deep Hacking: A Path of Changes</title><link>https://blog.deephacking.tech/en/posts/deep-hacking-a-path-of-changes/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/deep-hacking-a-path-of-changes/</guid><description>Discover the evolution of Deep Hacking from its beginnings in 2021 to becoming an international community platform. Learn about the changes, improvements and the new version built with Astro.</description><category>Miscellaneous</category><author>Juan Antonio González Mena</author></item><item><title>eMAPT Review - Mobile Application Penetration Tester 2025</title><link>https://blog.deephacking.tech/en/posts/ine-emapt-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/ine-emapt-review/</guid><description>Complete review of INE Security&apos;s eMAPT certification: preparation, exam, tips, and whether it&apos;s really worth it for mobile pentesting.</description><category>Certifications</category><author>Daniel Moreno</author></item><item><title>CWES Review - HackTheBox Certified Web Exploitation Specialist 2025</title><link>https://blog.deephacking.tech/en/posts/htb-cwes-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/htb-cwes-review/</guid><description>Complete review of HackTheBox&apos;s CWES certification: preparation, exam, comparison with eWPTX and BSCP, and tips to pass.</description><category>Certifications</category><author>Daniel Moreno</author></item><item><title>CPTS Review - HackTheBox Certified Penetration Testing Specialist 2025</title><link>https://blog.deephacking.tech/en/posts/htb-cpts-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/htb-cpts-review/</guid><description>Complete review of HackTheBox&apos;s CPTS certification: preparation, exam, comparison with OSCP, tips, and final thoughts.</description><category>Certifications</category><author>Oliver Felix Giovanardi</author></item><item><title>HackTricks AzRTE Review – Certified Azure Red Team Expert 2025</title><link>https://blog.deephacking.tech/en/posts/hacktricks-azrte-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/hacktricks-azrte-review/</guid><description>Complete review of HackTricks Training&apos;s AzRTE certification: course content, hands-on labs, exam, and my experience as a Certified Azure Red Team Expert 2025.</description><category>Certifications</category><author>Hector Ruiz Ruiz</author></item><item><title>Oh My Pentest Report - Oh My Zsh Theme for Pentesters</title><link>https://blog.deephacking.tech/en/posts/oh-my-pentest-report-zsh-theme/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/oh-my-pentest-report-zsh-theme/</guid><description>Oh My Pentest Report is a custom theme for Oh My Zsh designed for pentesters: automatic command logging, dynamic IP display, date/time, and Git support.</description><category>Miscellaneous</category><author>Juan Antonio González Mena</author></item><item><title>CAI, the Future of AI in Cybersecurity</title><link>https://blog.deephacking.tech/en/posts/cai-ai-cybersecurity/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/cai-ai-cybersecurity/</guid><description>Discover CAI, the open-source AI framework for automated pentesting: real results on HTB, PortSwigger, and bug bounties, revolutionary offensive and defensive capabilities.</description><category>Miscellaneous</category><author>Luis Javier Navarrete</author></item><item><title>Offensive Phishing Operations Review - MalDev Academy</title><link>https://blog.deephacking.tech/en/posts/maldevacademy-offensive-phishing-operations-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/maldevacademy-offensive-phishing-operations-review/</guid><description>Review of the Offensive Phishing Operations course from MalDev Academy: secure phishing infrastructures, detection evasion, anti-bot techniques and AITM with Evilginx.</description><category>Certifications</category><author>Juan Antonio González Mena</author></item><item><title>How to Install Game of Active Directory (GOADv3) on Windows</title><link>https://blog.deephacking.tech/en/posts/how-to-install-game-of-active-directory-goadv3-on-windows/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/how-to-install-game-of-active-directory-goadv3-on-windows/</guid><description>Complete guide to install GOADv3, the best Active Directory lab for practicing pentesting, using VMWare and Python on Windows.</description><category>Active Directory</category><author>Juan Antonio González Mena</author></item><item><title>Abusing Vulnerable Drivers to Terminate Privileged Processes</title><link>https://blog.deephacking.tech/en/posts/abusing-vulnerable-drivers-to-terminate-privileged-processes/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/abusing-vulnerable-drivers-to-terminate-privileged-processes/</guid><description>Detailed analysis of how to exploit vulnerabilities in Windows drivers to terminate privileged processes and evade EDR and AV solutions through the abuse of the TrueSight.sys driver.</description><category>Windows</category><author>Julio Ángel Ferrari Medina</author></item><item><title>How to Install Magisk on Emulated Devices with Android Studio</title><link>https://blog.deephacking.tech/en/posts/how-to-install-magisk-on-emulated-devices-with-android-studio/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/how-to-install-magisk-on-emulated-devices-with-android-studio/</guid><description>Learn how to install Magisk on Android Studio emulated devices to create a complete mobile pentesting environment with root access, Burp Suite certificates, and Frida through Magisk modules.</description><category>Mobile Pentesting</category><author>Pablo Castillo</author></item><item><title>Types of Groups in Active Directory</title><link>https://blog.deephacking.tech/en/posts/active-directory-groups/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/active-directory-groups/</guid><description>Discover the different types of groups in Active Directory, their scopes, differences with OUs, and the most important groups for domain security.</description><category>Active Directory</category><author>Juan Antonio González Mena</author></item><item><title>SSH Agent Hijacking</title><link>https://blog.deephacking.tech/en/posts/ssh-agent-hijacking/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/ssh-agent-hijacking/</guid><description>Learn how SSH Agent Hijacking works, techniques to abuse active SSH sessions, privilege escalation, and how to compromise remote servers through SSH sockets.</description><category>Linux</category><author>Juan Antonio González Mena</author></item><item><title>Certified WiFiChallenge Professional (CWP) Review 2025 - The Best WiFi Hacking Certification</title><link>https://blog.deephacking.tech/en/posts/wifichallenge-cwp-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/wifichallenge-cwp-review/</guid><description>Complete review of the CWP (Certified WiFiChallenge Professional) certification, the best WiFi hacking certification on the market. Analysis of the course, lab, exam, and comparison with OSWP.</description><category>Certifications</category><author>Juan Antonio González Mena</author></item><item><title>What are Security Identifiers (SIDs)</title><link>https://blog.deephacking.tech/en/posts/security-identifiers/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/security-identifiers/</guid><description>Discover what Security Identifiers (SIDs) are in Windows, their structure, types, and how they are used in the security system to identify users, groups, and sessions.</description><category>Active Directory</category><category>Windows</category><author>Juan Antonio González Mena</author></item><item><title>Kali Linux on Windows Without Installation or Administrator Privileges with Qemu</title><link>https://blog.deephacking.tech/en/posts/kali-linux-on-windows-without-installation-with-qemu/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/kali-linux-on-windows-without-installation-with-qemu/</guid><description>Learn how to run Kali Linux on Windows without needing administrator privileges or installation using Qemu as a portable emulator.</description><category>Linux</category><category>Windows</category><author>Juan Antonio González Mena</author></item><item><title>Physical Device Configuration for Android Pentesting</title><link>https://blog.deephacking.tech/en/posts/physical-device-configuration-android-pentesting/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/physical-device-configuration-android-pentesting/</guid><description>Learn how to configure a physical Android device for pentesting through rooting with Magisk, including bootloader unlocking, custom recovery installation, and Burp Suite certificate configuration.</description><category>Mobile Pentesting</category><author>Pablo Castillo</author></item><item><title>Anatomy of the Portable Executable (PE) Format</title><link>https://blog.deephacking.tech/en/posts/anatomy-of-the-portable-executable-format/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/anatomy-of-the-portable-executable-format/</guid><description>Discover the internal structure of the Windows PE format: DOS headers, NT Headers, sections and data directories for malware development and analysis.</description><category>Windows</category><author>Juan Antonio González Mena</author></item><item><title>Introduction to Browser Exploitation</title><link>https://blog.deephacking.tech/en/posts/introduction-to-browser-exploitation/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/introduction-to-browser-exploitation/</guid><description>Introduction to web browser exploitation: how JavaScript engines work, Chrome&apos;s security architecture, and common vulnerabilities.</description><category>Web</category><author>Iván Cabrera Fresno</author></item><item><title>Active Directory - Directory and Schema</title><link>https://blog.deephacking.tech/en/posts/directory-and-schema-of-active-directory/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/directory-and-schema-of-active-directory/</guid><description>Explore the internal structure of Active Directory: NTDS database, naming contexts, schema, classes, attributes, and the Global Catalog to understand how information is organized and managed in AD.</description><category>Active Directory</category><author>Juan Antonio González Mena</author></item><item><title>Malware Development Course Review - MalDev Academy</title><link>https://blog.deephacking.tech/en/posts/maldevacademy-malware-development-course-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/maldevacademy-malware-development-course-review/</guid><description>Comprehensive analysis of MalDev Academy, the platform specialized in malware development with over 140 modules, code database, and private Discord to learn red teaming techniques and AV/EDR evasion.</description><category>Certifications</category><author>Juan Antonio González Mena</author></item><item><title>CRTO Review - Red Team Ops 2024</title><link>https://blog.deephacking.tech/en/posts/zeropointsecurity-crto-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/zeropointsecurity-crto-review/</guid><description>Complete review of the CRTO (Certified Red Team Operator) certification, including syllabus, practical labs, exam tips, and recommendations to pass.</description><category>Certifications</category><author>Victor Capatina</author></item><item><title>Reversing an ASM x86-32 Function</title><link>https://blog.deephacking.tech/en/posts/reversing-an-asm-x86-32-function/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/reversing-an-asm-x86-32-function/</guid><description>Static and dynamic analysis of an x86-32 assembly function. Learn reversing through a practical exercise from the Practical Reverse Engineering book.</description><category>Low Level</category><author>Adrià Pérez Montoro</author></item><item><title>Introduction to RFID Technology</title><link>https://blog.deephacking.tech/en/posts/introduction-to-rfid-technology/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/introduction-to-rfid-technology/</guid><description>Discover what RFID technology is, how low and high frequency tags work, their applications in access control, contactless payments, and how to identify the frequency of RFID tags.</description><category>Miscellaneous</category><author>Antonio Sánchez (sh0x)</author></item><item><title>Trusts in Active Directory</title><link>https://blog.deephacking.tech/en/posts/trusts-in-active-directory/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/trusts-in-active-directory/</guid><description>Complete guide on trusts in Active Directory: trust types, direction, transitivity, Trust Domain Objects (TDO) and how to enumerate trust relationships with PowerView.</description><category>Active Directory</category><author>Juan Antonio González Mena</author></item><item><title>Introduction to Active Directory</title><link>https://blog.deephacking.tech/en/posts/introduction-to-active-directory/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/introduction-to-active-directory/</guid><description>Learn the fundamental concepts of Active Directory, from its origins to its hierarchical structure with domains, forests, group policies, and domain controllers.</description><category>Active Directory</category><author>Juan Antonio González Mena</author></item><item><title>OSED Review - OffSec Exploit Developer 2024</title><link>https://blog.deephacking.tech/en/posts/offsec-osed-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/offsec-osed-review/</guid><description>Personal experience and complete guide on Offensive Security&apos;s OSED certification: prerequisites, course tips, labs, and strategies to pass the exam.</description><category>Certifications</category><author>Adrián Díaz Aguilar</author></item><item><title>Kali Linux on Windows through WSL2</title><link>https://blog.deephacking.tech/en/posts/kali-linux-on-windows-through-wsl2/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/kali-linux-on-windows-through-wsl2/</guid><description>Learn how to install Kali Linux with a graphical interface on Windows using WSL2. Complete guide with three display modes and environment configuration.</description><category>Windows</category><author>Juan Antonio González Mena</author></item><item><title>Constrained Delegation and Resource-Based Constrained Delegation (RBCD) - Kerberos</title><link>https://blog.deephacking.tech/en/posts/constrained-delegation-y-resource-based-constrained-delegation/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/constrained-delegation-y-resource-based-constrained-delegation/</guid><description>Complete guide on Constrained Delegation and Resource-Based Constrained Delegation (RBCD) in Kerberos, including S4U2Proxy and S4U2Self extensions, enumeration, and exploitation techniques.</description><category>Active Directory</category><author>Juan Antonio González Mena</author></item><item><title>Hacktricks ARTE Review - Certified AWS Red Team Expert 2024</title><link>https://blog.deephacking.tech/en/posts/hacktricks-arte-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/hacktricks-arte-review/</guid><description>Complete review of HackTricks Training&apos;s ARTE certification: AWS Red Team course, cloud labs, hands-on exam, and my experience as an AWS Red Team Expert.</description><category>Certifications</category><author>Axel Losantos Lizaso</author></item><item><title>OSWP Review - OffSec Wireless Professional 2024</title><link>https://blog.deephacking.tech/en/posts/offsec-oswp-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/offsec-oswp-review/</guid><description>Complete review of the OSWP (OffSec Wireless Professional) certification with tips, preparation advice and personal experience from the WiFi pentesting exam.</description><category>Certifications</category><author>Adrià Pérez Montoro</author></item><item><title>CRTO II / CRTL Review - Red Team Ops 2 2024</title><link>https://blog.deephacking.tech/en/posts/zeropointsecurity-crtl-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/zeropointsecurity-crtl-review/</guid><description>Complete and honest review of the CRTO II / CRTL (Red Team Leader) certification, including EDR evasion techniques, exam tips, and additional resources.</description><category>Certifications</category><author>Victor Capatina</author></item><item><title>OSEP Review - OffSec Experienced Penetration Tester 2024</title><link>https://blog.deephacking.tech/en/posts/offsec-osep-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/offsec-osep-review/</guid><description>Complete and honest review of the OSEP certification (OffSec Experienced Penetration Tester), including tips, exam advice, and useful tools to pass.</description><category>Certifications</category><author>Victor Capatina</author></item><item><title>From an Old Postcard to the Exact Current Location</title><link>https://blog.deephacking.tech/en/posts/from-old-postcard-to-exact-current-location/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/from-old-postcard-to-exact-current-location/</guid><description>OSINT investigation to determine the exact location of an old Italian postcard using image restoration techniques, reverse search, and geographic analysis.</description><category>OSINT</category><author>Juan Antonio González Mena</author></item><item><title>SSL Pinning Bypass in Android Applications</title><link>https://blog.deephacking.tech/en/posts/ssl-pinning-bypass-android-applications/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/ssl-pinning-bypass-android-applications/</guid><description>Learn how to perform dynamic analysis of Android applications by bypassing SSL Pinning using Frida and Objection to intercept network traffic.</description><category>Mobile Pentesting</category><author>Pablo Castillo</author></item><item><title>Unicode Characters in Burp Suite</title><link>https://blog.deephacking.tech/en/posts/unicode-characters-in-burp-suite/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/unicode-characters-in-burp-suite/</guid><description>Discover how to use Unicode characters in Burp Suite to bypass web application filters and improve your pentesting techniques.</description><category>Web</category><author>Eric Labrador</author></item><item><title>CARTP Review - Certified Azure Red Team Professional 2023</title><link>https://blog.deephacking.tech/en/posts/alteredsecurity-cartp-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/alteredsecurity-cartp-review/</guid><description>Personal review and experience with the CARTP certification from Altered Security, including details about the exam, lab, and advice for future candidates.</description><category>Certifications</category><author>Axel Losantos Lizaso</author></item><item><title>BSCP Review - Burp Suite Certified Practitioner 2023</title><link>https://blog.deephacking.tech/en/posts/portswigger-bscp-review/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/portswigger-bscp-review/</guid><description>Complete review of the BSCP (Burp Suite Certified Practitioner) certification from PortSwigger: exam experience, preparation with Web Security Academy, tips and resources to pass.</description><category>Certifications</category><author>{REDACTED}</author></item><item><title>JWT Authentication Bypass via Weak Signing Key – PortSwigger Write-Up</title><link>https://blog.deephacking.tech/en/posts/jwt-authentication-bypass-via-weak-signing-key/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/jwt-authentication-bypass-via-weak-signing-key/</guid><description>Learn to exploit JWT vulnerabilities with weak signing keys in this PortSwigger lab write-up on JWT authentication.</description><category>PortSwigger Labs</category><author>Juan Antonio González Mena</author></item><item><title>Kali Linux on Docker</title><link>https://blog.deephacking.tech/en/posts/kali-linux-on-docker/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/kali-linux-on-docker/</guid><description>Complete guide to install and manage Kali Linux on Docker. Learn to configure the environment, tunnel traffic through Burp Suite, and manage containers.</description><category>Linux</category><category>Windows</category><author>Juan Antonio González Mena</author></item><item><title>How the DNS Protocol Works</title><link>https://blog.deephacking.tech/en/posts/how-the-dns-protocol-works/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/how-the-dns-protocol-works/</guid><description>Learn how the DNS protocol works, the types of servers involved in domain resolution, and the most common DNS records used on the internet.</description><category>OSINT</category><author>Juan Antonio González Mena</author></item><item><title>JWT authentication bypass via flawed signature verification – PortSwigger Write Up</title><link>https://blog.deephacking.tech/en/posts/jwt-authentication-bypass-via-flawed-signature-verification/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/jwt-authentication-bypass-via-flawed-signature-verification/</guid><description>Walkthrough of the PortSwigger lab on JWT authentication bypass through flawed signature verification, exploring how to exploit servers that accept unsigned tokens with the &apos;none&apos; algorithm.</description><category>PortSwigger Labs</category><author>Juan Antonio González Mena</author></item><item><title>JWT authentication bypass via unverified signature – PortSwigger Write Up</title><link>https://blog.deephacking.tech/en/posts/jwt-authentication-bypass-via-unverified-signature/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/jwt-authentication-bypass-via-unverified-signature/</guid><description>Walkthrough of the PortSwigger lab on JWT authentication bypass through unverified signatures, explaining how to exploit this vulnerability when the server doesn&apos;t properly validate token signatures.</description><category>PortSwigger Labs</category><author>Juan Antonio González Mena</author></item><item><title>How to Patch AmsiScanBuffer to Evade AMSI</title><link>https://blog.deephacking.tech/en/posts/how-to-patch-amsiscanbuffer-to-evade-amsi/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/how-to-patch-amsiscanbuffer-to-evade-amsi/</guid><description>Learn how to evade AMSI on Windows by patching the AmsiScanBuffer function, including the use of pinvoke to call native APIs and obfuscation techniques.</description><category>Windows</category><author>Miguel Ángel Cortés</author></item><item><title>How to Tunnel and Intercept Android Device Traffic</title><link>https://blog.deephacking.tech/en/posts/how-to-tunnel-and-intercept-android-device-traffic/</link><guid isPermaLink="true">https://blog.deephacking.tech/en/posts/how-to-tunnel-and-intercept-android-device-traffic/</guid><description>Learn how to configure Burp Suite to intercept network traffic from an Android device by installing system certificates and configuring the HTTP proxy.</description><category>Mobile Pentesting</category><author>Pablo Castillo</author></item></channel></rss>